the future of identity in the cloud:the future of...

51
The Future of Identity in the Cloud: The Future of Identity in the Cloud: Requirements Risks & Requirements, Risks & Opportunities Opportunities Marco Casassa Mont [email protected] HP Labs Systems Security Lab Bristol, UK © 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice

Upload: lydat

Post on 27-Apr-2018

220 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

The Future of Identity in the Cloud:The Future of Identity in the Cloud:Requirements Risks &Requirements, Risks & OpportunitiesOpportunities

Marco Casassa Mont [email protected]

HP LabsSystems Security LabBristol, UK

© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice

Page 2: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Presentation Outline

S tti th C t t Cl d C ti• Setting the Context: Cloud Computing• Identity in the Cloud, Risks and Requirementsy , q• Current Approaches and Initiatives

Towards the Future of Identity in the Cloud• Towards the Future of Identity in the Cloud• Conclusions

Page 3: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Cloud Computing: Definition

• No Unique Definition or General Consensus about what Cloud Computing is …

• Different Perspectives & Focuses (Platform, SW, Service p ( , ,Levels…)

• Flavours:− Computing and IT Resources Accessible Onlinep g− Dynamically Scalable Computing Power − Virtualization of Resources

A t ( t ti ll ) C bl & I t h bl S i− Access to (potentially) Composable & Interchangeable Services − Abstraction of IT Infrastructure

No need to understand its implementation: use Services & their APIsNo need to understand its implementation: use Services & their APIs− Related “Buzzwords”: Iaas, PaaS, SaaS, EaaS, … − Some current players, at the Infrastructure & Service Level:

Salesfoce.com, Google Apps, Amazon, Yahoo, Microsoft, IBM, HP, etc.

Page 4: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Cloud Service LayersService Users

ice

ider

s

Cloud End-User Services (SaaS)S

erv

Pro

v

Cloud Platform Services (PaaS)ers

( )

Pro

vid

Cloud Infrastructure Services (IaaS)

loud

P

Physical Infrastructure

C

Source: HP Labs, Automated Infrastructure Lab (AIL), Bristol, UK - Peter Toft

Page 5: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Cloud Computing: Models

On Demand

Cloud Provider #1

DataOffice

On DemandCPUsPrinting

Service CRMService Data

StorageService

OfficeApps

Cloud…

User

Enterprise

Cloud Provider #2

BackupService

Service 3

ILMServiceService

ServiceEmployee

ServiceBusiness

Apps/Service ……

Internal Cloudpp

… The Internet

Page 6: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Cloud Computing: Key Aspectsp g y p

• Internal, External and Hybrid Clouds− Cloud Providers and/or The Internet

• Infrastructure ProvidersS i P id• Service Providers

Composition of Services• Composition of Services− Within a Cloud Provider− Across Cloud Providers− Across Cloud Providers

• Entities consuming Services in the Clouds• Entities consuming Services in the Clouds− Organisations:

• Business Applications, Services, etc.Business Applications, Services, etc.• Employees

− Private Users

Page 7: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Cloud Computing: Implicationsp g p

• Enterprise:Paradigm Shift from “Close & Controlled” IT Infrastructures and Services to Externally Provided Services and IT Infrastructures

• Private User:Paradigm Shift from Accessing Static Set of Services to Dynamic & g g yComposable Services

General Issues:• General Issues:− Potential Loss of Control (on Data, Infrastructure, Processes, etc.)− Data & Confidential Information Stored in The Clouds− Management of Identities and Access (IAM) in the Cloud− Compliance to Security Practice and Legislation

(C C )− Privacy Management (Control, Consent, Revocation, etc.)− New Threat Environments− Reliability and Longevity of Cloud & Service ProvidersReliability and Longevity of Cloud & Service Providers

Page 8: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Cloud Computing: InitiativesCloud Computing: InitiativesRecent General Initiatives aiming at Shaping Cloud Computing:

• Open Cloud Manifestop− Making the case for an Open Cloud

• Cloud Security Alliance− Promoting Best Security Practices for the Cloud

• Jericho Forum− Cloud Cube Model:

Recommendations & (Security) EvaluationFramework

• …

Page 9: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Presentation Outline

S tti th C t t Cl d C ti• Setting the Context: Cloud Computing• Identity in the Cloud, Risks and Requirementsy , q• Current Approaches and Initiatives

Towards the Future of Identity in the Cloud• Towards the Future of Identity in the Cloud• Conclusions

Page 10: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity and Access Management (IAM)

- Enterprise IAM• Network Access Control (NAC) • Directory Services• Authentication Authorization Audit• Authentication, Authorization, Audit• Provisioning• Single-Sign-On,F d tiFederation

• …- IAM is part of pIT Security Strategy

• Risk ManagementRisk Management• Policy Definitions • Compliance &Governance PracticesGovernance Practices

• Legislation

B d E t i C t tBased on Enterprise ContextsNeed to Think about IAM in the Cloud Paradigm

Page 11: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity in the Cloud: Enterprise Case

On Demand

Cloud Provider #1User Account

Provisioning/D i i i

User Account

PII Data& Confidential

I f tiIAM Capabilities

DataOffice

On DemandCPUsPrinting

Service CRMService

Identity &Credentials

AuthenticationAuthorization

Audit

AuthenticationAuthorization

De-provisioning Provisioning/De-provisioning

InformationIAM Capabilities and Services

Can be O t d i Data

StorageService

OfficeApps

Cloud

Identity &Credentials

Identity &

Audit Audit

PII Data& Confidential

Information

Outsourced inThe Cloud …

Enterprise

Cloud Provider #2

…Identity &Credentials

Identity &Credentials

User AccountP i i i /

Information

BackupService ILM

S iIdentity &C d i l

AuthenticationAuthorization

A dit

AuthenticationAuthorization

Provisioning/De-provisioning PII Data

& ConfidentialInformation

Service 3

ServiceService

ServiceEmployee

Credentials

Identity &Credentials

Audit Audit

User AccountPII Data

& ConfidentialService

BusinessApps/Service …

…Identity &Credentials

User AccountProvisioning/

De-provisioning

& ConfidentialInformation

Internal Cloudpp

… The Internet

Page 12: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity in the Cloud: Enterprise Case

Issues and Risks [1/2]• Potential Proliferation of Required Identities & Credentials to Access Services

Misbehaviours when handling credentials (writing down, reusing, sharing, etc.)

• Complexity in correctly “enabling” Information Flows across boundaries Security Threats(Enterprise Cloud & Service Providers, Service Provider Service Provider, …_(

• Propagation of Identity and PII Information across Multiple Clouds/Services Privacy issues (e.g. compliance to multiple Legislations, Importance of Location, etc.)Exposure of business sensitive information (employees’ identities, roles, organisational structures, enterprise apps/services, etc.)How to effectively Control this Data?

• Delegation of IAM and Data Management Processes to Cloud and Service Providers How to get Assurance that these Processes and Security Practice are Consistent with E t i P li i ?Enterprise Policies?- Recurrent problem for all Stakeholders: Enterprise, Cloud and Service Providers … Consistency and Integrity of User Accounts & Information across various Clouds/ServicesHow to deal with overall Compliance and Governance issues?How to deal with overall Compliance and Governance issues?

Page 13: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity in the Cloud: Enterprise Case

Issues and Risks [2/2]

• Migration of Services between Cloud and Service Providers Management of Data Lifecycleg

• Threats and Attacks in the Clouds and Cloud ServicesCloud and Service Providers can be the “weakest links” wrt Security & Privacy Reliance on good security practice of Third Parties

Page 14: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity in the Cloud: Consumenr Casey

On Demand

Cloud Provider #1

PII Data PII Data

DataOffice

On DemandCPUsPrinting

Service CRMServiceIdentity &

AuthenticationAuthorization

Audit

PII Data& Confidential

Information

PII Data& Confidential

Information

DataStorageService

OfficeApps

CloudDeliveryS i

UserCredentials

Identity &Credentials

AuthenticationAuthorization

User AccountProvisioning/

De-provisioningCloud Provider #2

Service

Identity &

AuthorizationAudit

User AccountProvisioning/

De provisioning

BackupService

Credentials

AuthenticationAuthorization

Audit

De-provisioning

U A t

Service 3

ILMService

AuditUser AccountProvisioning/

De-provisioning PII Data& Confidential

……

& ConfidentialInformation

… The Internet

Page 15: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity in the Cloud: User Case

Issues and Risks• Potential Proliferations of Identities & Credentials to Access Services

Misbehaviours when handling credentials (writing down, reusing, sharing ,etc.)

• Potential Complexity in Configuring & Handling Interactions between various ServicesIntroducing vulnerabilities

• Propagation of Identity and PII Information across Multiple Clouds/Sites Privacy issues (e.g. compliance to multiple Legislations, Importance of Location, etc.)How to handle Consent and Revocation? How to effectively Control this data?

• Trust IssueHow to get Assurance that Personal Data and Confidential Information is goingto be Handled as Expected, based on Users’ (privacy) Preferences and Expectations?Migration and Deletion of Data

• New ThreatsBogus Cloud and Service ProvidersIdentity TheftsIdentity TheftsConfiguration & Management Mistakes

Page 16: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity in the CloudRequirementsRequirements

• Simplified Management of Identities and Credentials• Simplified Management of Identities and Credentials• Need for Assurance and Transparency about:

− IAM (Outsourced) Processes − Security & Privacy Practices− Data Lifecycle Management

• Compliance to Regulation, Policies and Best Practice− Need to redefine what Compliance means in The Cloud

• Accountabilityy• Privacy Management: Control on Data Usage & Flows• Reputation Management• Reputation Management

Page 17: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Presentation Outline

S tti th C t t Cl d C ti• Setting the Context: Cloud Computing• Identity in the Cloud, Risks and Requirementsy , q• Current Approaches and Initiatives

Towards the Future of Identity in the Cloud• Towards the Future of Identity in the Cloud• Conclusions

Page 18: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity in the Cloud:Identity Proxy Approach

On Demand

Cloud Provider #1

DataOffice

On DemandCPUsPrinting

Service CRMService Data

StorageService

OfficeApps

Cloud…

Enterprise

Cloud Provider #2

BackupService

IdentityProxy/Mediator

Service 3

ILMServiceService

ServiceEmployee

ServiceBusiness

Apps/Service ……

Internal Cloudpp

… The Internet

Page 19: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity Proxy/Mediator Approachy y pp

• Enterprise-focusedp• Centralised Management of Credentials and User Accounts• Interception by Identity Proxy and mapping to “External Identities/Accounts”

Pros• Enterprise Control on Identities and mappingsp pp g• Centralisation & Local Compliance

ConsCons• Scalability Issues. What about the management of Identities exposed between Composed Services p p(Service1 Service2)?• Lack of Control beyond first point of contact

Accountability and Global Compliance Issues• Accountability and Global Compliance Issues

Page 20: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity in the Cloud: Federated Approach

On Demand

Cloud Provider #1Identity

Provider (IdP)Registration

DataOffice

On DemandCPUsPrinting

Service CRMService

Provider (IdP)Identity

Provider (IdP)

DataStorageService

OfficeApps

Cloud…

User

Enterprise

Cloud Provider #2Registration

BackupService

IdentityProvider (IdP)

Service 3

ILMServiceService

ServiceEmployee

ServiceBusiness

Apps/Service ……

IdentityProvider (IdP)

Internal Cloudpp

… The Internet

Page 21: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity in the Cloud: Federated Approach

• Federated Identity Management: Identity & Service Providers

y

y g y• Cloud Provider could be the “Identity Provider” for the Services/Service Providers in its CloudApproach suitable for Enterprises and private Users• Approach suitable for Enterprises and private Users

Pros• “Cloud Provider-wide” Control and Management of Identities• Potential setting of Security and Privacy constraints at theIdentity Provider siteIdentity Provider site

• Circle of Trusts Auditing, Compliance Checking, etc. • Handled with Contracts and SLAs

ConsIdPs become a bottleneck/central point of control privacy issues• IdPs become a bottleneck/central point of control privacy issues

• Scalability across multiple Cloud Providers. Federated IdPs?• Reliance on IdPs for Assurance and Compliance (Matter of Trust …)p ( )

Page 22: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Presentation Outline

S tti th C t t Cl d C ti• Setting the Context: Cloud Computing• Identity in the Cloud, Risks and Requirementsy , q• Current Approaches and Initiatives

Towards the Future of Identity in the Cloud• Towards the Future of Identity in the Cloud• Conclusions

Page 23: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Future of Identity in the Cloud: Driversy

• It is Not just a Matter of Technologies and Operational SolutionsIt is Not just a Matter of Technologies and Operational Solutions

• Need for effective Compliance to Laws and Legislation (SOX, HIPAA, EU data Directives etc ) Business Agreements and PoliciesEU data Directives, etc.), Business Agreements and Policies

• Need for more Assurance:E t i A th t IAM S it P i d D t M t− Enterprises: Assurance that IAM, Security, Privacy and Data Management processes are run as expected by Cloud Providers and Service Providers

− Service Providers: Assurance from other Service Providers and CloudService Providers: Assurance from other Service Providers and Cloud Providers

− End-Users: Assurance about Privacy, Control on Data, etc.End Users: Assurance about Privacy, Control on Data, etc.

• Need for Transparency and Trust about IAM processes and Data Management in the CloudsManagement in the Clouds

• Privacy Management

Page 24: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Future of Identity in the Cloud: OpportunitiesFuture of Identity in the Cloud: Opportunities

• New Ways to provide Services Compose them and get theNew Ways to provide Services, Compose them and get the best deals, both for Users and Organisations

Identity and Identity Management is going to Play a key y y g g g y yRole

• Unique Chance to re-think what Identity and Identity Management means in the Cloud and how to Handle it

vs. simply trying to adapt and use the old IAM model

• New Technological, Personal and Social Challenges

Opportunity for Research and Development of newOpportunity for Research and Development of new Solutions

Page 25: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Future of Identity in the Cloudy

Overview of some HP Labs Research Areas 1. Trusted Infrastructure and Cloud Computing

2. Identity Assurance

3 Id tit A l ti3. Identity Analytics

4. EnCoRe Project – Ensuring Consent and Revocationj g

HP Labs Systems Security Lab (SSL) Bristol UKHP Labs, Systems Security Lab (SSL), Bristol, UKhttp://www.hpl.hp.com/research/systems_security/

Page 26: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

1. Trusted Infrastructure

• Ensuring that the Infrastructural

On DemandCPUsPrinting

Cloud Provider #1

gIT building blocks of the Cloudare secure, trustworthyand compliant with

DataStorageService

OfficeApps

CPUsPrintingService CRM

Service

User Trusted

TrustedClient

Infrastructure

and compliant withsecurity best practice

Role of Trusted

E t i

Service

Cloud Provider #2

User TrustedClient

Devices

Infrastructure• Role of Trusted ComputingGroup (TCG)

/ EnterpriseBackupService

TrustedClient

/

• Impact and Role of Virtualization

Service 3

Service

ILMServiceService

ServiceEmployee

ClientInfrastructureTrusted

ClientInfrastructure

Internal Cloud

Service

BusinessApps/Service … …

ThInternal Cloud … The Internet

TCG: http://www.trustedcomputinggroup.org

Page 27: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Trusted InfrastructureEvolution Towards Services in The Cloud

More and more applications and• More and more applications and services will be delivered on remote infrastructures we don’t own

H t d HALO li ti

OS TVA

TVA

TVA

• However, we need to maintain the user experience whether or not there is good network connectivity

Hosted HALO application

OSHosted VOIP application

Hypervisor

TVA

TVA

• A new business need is emerging that will benefit from a mix of thin and thick client capabilities

OS

Open Network -Cloud -Hypervisor

Hosted TVC Management

TVA

TVA

• Hence we need:− a new generation of client devices

that provide safe and adaptive

Hypervisor

Hosted CCI infrastructure

OS TVA

TVA

TVA

TVA

TVA

TVA

p paccess to cloud services…

− …and more than ever we need to be able to manage them at reduced cost

f

Hypervisor

− A new generation of servers that are trusted and whose security capabilities can be tested and proved

Untrusted Open Internet

Secure Distributed B i A li tiBusiness Application

Source: HP Labs, Systems Security Lab, Richard Brown

Page 28: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Trusted Infrastructure: Trusted Virtualized Platform

HP Labs: Applying Trusted Computing to Virtualization

Secure Corporate (Government) Client Persona

PersonalClient Persona

Services managed from

pp y g p g

Client PersonaClient Persona managed from cloud

Personal Corporate P d ti itRemoteHome Corporate

ProductionE-Govt Corp.S ftEnvironment

Win/Lx/OSXProductivity

OSRemoteIT MgmtBanking Production

EnvironmentOS

Intf. SoftPhone

Trusted Hypervisor

Trusted CorporateClient Appliance

Trusted Personal Client Appliances pp

online (banking, egovt) or local (ipod)

Source: HP Labs, Systems Security Lab, Richard Brown

Page 29: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Paradigm Shift: Identities/Personae as “Virtualised Environment” in the CloudVirtualised Environment in the Cloud

erso

na 1

+lis

ed

onm

ent 1

erso

na 2

+is

ed

onm

ent 2

Bank

My

PeVi

rtual

Env

iro

My

PeVi

rtual

Env

ir o

Gaming…

Trusted Hypervisorg

CommunityServices

End-User Device

Using Virtualization to push Control from the Cloud/Service back to the Client Platform

•User’s Persona is defined by the Service Interaction Context •User’s Persona & Identity are “tight” to the Virtualised Environment•Persona defined by User or by Service Provider•Potential Mutual attestation of Platforms and Integrity

Page 30: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Specifiable, Manageable and Attestable gVirtualization LayerLeverage Trusted Computing technology for Increased

Assurance

Enabling remote attestation of Invariant Security Properties implemented in the Trusted Virtualization Layer

Trusted Virtual Platform

BankingApplication

Trusted Virtual Platform

GamingApplication

ManagementDomain

VirtualisedTPM (vTPM)

ApplicationvTPM

ApplicationvTPM

Trusted Infrastructure Interface (TII)

Physical

SoftwareIntegrity

TPM

Firmware

PhysicalPlatformIdentity

Source: HP Labs, Systems Security Lab, Richard Brown

Page 31: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

2 Identity Assurance2. Identity Assurance

• Identity Assurance is concerned with “Providing Visibility into how Risks Associated with Identity Information are being Managed”being Managed

H D Thi d P t i th Cl d (Cl d P id• How Does a Third Party, in the Cloud (Cloud Provider, Service Provider, etc.) deal with Security and IAM Aspects, Compliance to Laws and Legislation?Compliance to Laws and Legislation?

H t id Id tit A i th Cl d?• How to provide Identity Assurance in the Cloud?

• HP Labs (Systems Security Lab) are exploring Mechanisms and Approaches in this space

Reference: http://www.hpl.hp.com/techreports/2008/HPL-2008-25.html

Page 32: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity AssuranceIdentity Assurance

Information Management Process, Operations and Controls

Add R dReview

C t

g , p

CreateIdentity

Verify

Accept Accept

AddData

ReadId Data

CorrectDelete Archive

Registration Identity informationMaintenance Destruction ID

MC

ontro

Audit/UsageTransparencyShare

Load from

ols

other Sites/IdPs/IDM systems

CIS

Underlying IT System

CO

BIT

SO

270000

Physical

Page 33: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity Assurance: Stakeholders in the Cloud

CloudIdentity

Provider (IdP)

Circle ofTrust

S i

ServiceProvider

Cloud Provider #1

Service Provider

Provider (IdP)

ServiceProvider

ServiceProvider

User

Cloud

Enterprise

Cloud Provider #2

ServiceProvider

IdentityProvider (IdP)

ServiceServiceEmployee Service

Provider

ServiceProvider

ServiceBusiness

Apps/Service

Provider

Internal Cloudpp

Page 34: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity Assurance in the CloudCloud Provider #1

IdentityProvider (IdP)

Circle ofTrust

AssuranceInformation Enhance

S i

ServiceProvider

Provider (IdP)IdPAssuranceInformation Match

IdentityAssuranceS

Trust

ServiceProviderService

ProviderCloud

MinimalAcceptableAssuranceI f ti

Service ProvidersA I f ti

Standards

Cloud Provider #2

Information Assurance Information

ServiceProvider

IdentityProvider (IdP)

ComplianceChecking

Enterprise ServiceProvider

ServiceProvider

Provider

PublicP i t

Legend

Assurance Report

Private

Page 35: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

HP Labs Model-based Assurance Approachpp

Explicit and Automated

Tests of IT Controls

Key Risk Indicators

pMonitoring of IAM Processes and Controls based on Audits & Logs

Assurance ReportsAssurance Model Design

Graphical Modelling

The model design process proceeds in four steps:

Tool

1. Categorize IT Controls/Processes/Mechanisms needed for Assurance

ReportGenerator R lt

Analysis E i

Web based reports

ModelRepository

needed for Assurance

2. Identify Measurable Aspects of these Controls

Audit Data StoreInstrumentation

Generator Results

Data

EngineXML representationof the model

Aspects of these Controls- Performance Indicators- Correctness Tests

3. Build the Control Analysis Model

4. Use the model to monitor for changing conditions and to provide assurance reports

Page 36: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity Assurance Model

ID Management

ITSupportDisposal

IdentityInfo ManagementCreation

Link to COBIT models

Registration

Verification

Access Id

RetentionPolicy

Staff Identity AssuranceConceptual

DocumentCheck

Verification

AuthenticationInfo Gathering

UsageTransparency

Review/Correct

Add/UpdateId Info

Conceptual Model

Load/ShareFrom other IDM

Top level traffic lightRepresentation of Model

Dashboard and Trends AccountManagement

RightsApprovals

Expand into details

of Model in Our Tool

gManagement Separation

of DutiesDetailed Information

Evaluation of Model Against gAudit Data and Logs

Assurance Reports

Page 37: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

3. Security and Identity AnalyticsProviding Strategic Decision SupportProviding Strategic Decision Support

• Focus on Organisation IT (Security) Decision Makers (CIOs/CISOs)g ( y) ( )• The growing complexity of IT and the increasing Threat Environment will

make related Security Investment Decisions Harder

• The Decision to use The Cloud and its Services is Strategic

Wh t M k I t t ( ith IdM N t k S it h t• Where to Make Investments (e.g. either IdM or Network Security, how to make business & security aligned …)? Which Choices need to be made? Which Strategy?Which Strategy?

• The HP Labs “Security Analytics” Project is exploring how to apply S i tifi M d lli d Si l ti th d l f St t i D i iScientific Modelling and Simulation methodology for Strategic Decision Support

• Identity Analytics Project is focusing on the IAM vertical

Page 38: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Organisations’ IT Security Challengesg y g

Develop Policy

Understand

Develop Policy

the Economics Construct Models

Decide &Deploy

Th t I t t

Technology

Threats, Investments

(Trusted)IT infrastructureRisk, Assurance, Compliance

38 4/27/2009

p

HP Confidential

Page 39: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity Analytics - Overview

Decision M akers’ “ Levers”• Problem: How to derive and justify theIAM strategy?

- IdM & Automation (AC, Auth, Prov/ Deprov, Federa tion, SSO, Audit, etc.)- Security Aspects (Pa tching, Remedia tion, HIPS, etc.)- Educa tion & Training- Detection & Punishment

gy• How much should we spend on IAM?

Where to invest? Multiple choices: Provisioning vs Biometrics vs

M d lli

- … Ex pla in & PredictImpact on

Factors of Relevance:

- Costs

Provisioning vs. Biometrics vs. Privacy Mgmt …

• What is the impact of new IT technologicalchoices from security privacy M odelling

Simula tion

Da ta Ana ly sis & Decision

Scenarios/ Contex ts

Hypothesis

Observa tions/Factua l Evidence

Costs- (Security) Risk Level- Trust- Reputa tion- Compliance

choices from security, privacy,usability and cost perspectives?

Id tit A l ti A h ySupport

Factua l Evidence- …

Identity Analytics

• Identity Analytics Approach:• System Modelling involving Processes,

IT Systems & Technologies,Trade-OffsEconomic TheoryPeople, Behaviours, etc. along with

cause-effect relationships• Using Models & Simulations

t l i t f h i d di tto explore impact of choices and predictoutcomes

• Exploring the Economics angle(losses costs etc ) by means of Utility Functions(losses, costs, etc.) by means of Utility Functions

HPL Project Material: http://www.hpl.hp.com/personal/Marco_Casassa_Mont/Projects/IdentityAnalytics/IdentityAnalytics.htm

Page 40: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity Analytics Applied to The Cloud

• Threat Environment

• Explanation & Predictions• Trade-offs• Economics Analysis

Data Analysis

• Threat Environment• Assumptions & Facts on IAM Processes

- Cloud and Service Provides• Assumptions & Facts on Security Processes

- Cloud and Service Providers

• Economics Analysis

On DemandCPUsPrinting

Service

Cloud Provider #1Simulations

• Investments

DataStorageService

OfficeApps

ServiceCRM

ServiceModelsDecision Support Tools

• Choices• Hypothesis• …

Cloud Provider #2

…• Threat Environment• IAM Processes• Security Processes

Enterprise BackupService ILM

ServiceService

Security Processes• Users’ Behaviours

Service 3

Service

Service

Service

B i

Employee

Internal Cloud

BusinessApps/Service … …

… The Internet

Page 41: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity Analytics Applied to The Cloud

Example: Predictions of Outsourcing of IAM Services

AccessA

ApprovalA

ProductivityCost

IDM ProvisioningC tre

s High-Level Metrics

to the Cloud

0.83 0.89 0.94 0.990.84 0.90 0.95 1

Accuracy Accuracy Cost Costs

urac

y M

easu

r

1

0.5

High-Level MetricsTailored to Target CIOs/CISOs &Strategic decision makers

Case #1Current

Case #2 Case #3 Case #4

Acc

usu

res

1000

000

00 3385

5

2575

3

1794

9

1040

3

1120

0

1430

0

1740

0

2050

0

State

Cos

t Mea

s

2030

000

4000

0

2

# Hanging Accounts # Denied Good Accounts# Misconfigured Accounts

EffortLevel

3480 1032 1134 3378 45122281 2230

#Internally Managed Provisioning Activities

# Externally ManagedProvisioning ActivitiesProvisioning Activities

(Internal Apps)Provisioning Activities(Services in the Cloud)

Overall Approval Time Overall Deployment Time Bypassed Approval Ste

Low-Level MeasuresTailored to Target Domain Experts

Page 42: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Security & Identity Analytics MethodologySecurity & Identity Analytics Methodology

S i ifi A h b d M d lli & Si l i

validation

Scientific Approach based on Modelling & Simulation

validation

Information Empirical Conceptual Formal InformationInformation System

EmpiricalData/Knowl

edge

ConceptualModelling

FormalModelling

Information SystemPP&T

Design explorationeconomic analysis

4/27/200942 HP Confidential

Page 43: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

4. TSB EnCoRe Project C t d R ti M tConsent and Revocation Management

E C R E i C t d R ti• EnCoRe: Ensuring Consent and RevocationUK TSB Project – http://www.encore-project.info/

“EnCoRe is a multi-disciplinary research project, spanning across a number of IT and social science specialisms that is researching how tonumber of IT and social science specialisms, that is researching how to improve the rigour and ease with which individuals can grant and, more importantly, revoke their consent to the use, storage and sharing of their personal data by others”

• Recognise the Importance of Cloud Computing and its g p p gImpact on Identities and Privacy

Problem: Management of Personal Data (PII) andConfidential Information along driven byConsent & Revocation

Page 44: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Identity Data + Consent/Revocationy

On Demand

Cloud Provider #1

DataOffice

On DemandCPUsPrinting

Service CRMServiceIdentity Data & Credentials Data

StorageService

OfficeApps

CloudDeliveryS i

User+

Consent/Revocation Identity Data & Credentials+

Consent/Revocation

Cloud Provider #2

Service

BackupService

Identity Data & Credentials+

Consent/Revocation

Service 3

ILMService

……

… The Internet

Page 45: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Consent and Revocation Lifecycley

Infividual:

Data

Infividual: Data DisclosureConsent &

RevocationLifecycle

No Data With No Consent

Individual: Consent

Individual: Revocation of Consent

Individual:

No Data

DataWith Consent

Consent Individual: Data Disclosure &

Consent

Individual: Individual:

Individual: Partial

ConsentIndividual:

(P ti l) R ti

DataWith (Partial)

Consent

Partial Revocation of Consent

Individual: Consent

Individual:C /

(Partial) Revocation of Consent

Individual:(Partial)

Revocationof Consent

Users’ Preferences, Access Control & Obligation Policies

Consent/Partial Revocation

Enforcement, Monitoring and Auditing of Policies and Preferences

Page 46: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

EnCoRe: Explicit Management of Consent and Revocation

Cloud Provider #1

Explicit Management of Consent and Revocation

On DemandCPUsPrinting

Service CRMS i

EnCoReToolBox EnCoRe

ToolBox

DataStorageService

OfficeApps

Service

UserEnCoReT lb

EnCoReToolBox Cloud

Provider #2…Toolbox ToolBox

EnCoRe

BackupService

EnCoReToolBox

Service 3

Service ILM

Service

Service 3

……

… The Internet

Page 47: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

EnCoRe: Explicit Management of Consent and RevocationRevocation

Data +

s

(Virtual)Data

RegistryData + Consent

Data location& consent/revocationregistration

Access toServices

Data +Consent &Revocation Requests Registration

& Update

Empl

oyee

sUser AccountProvisioning &Data Storage

Consent & RevocationProvisioning

PersonalConsent &RevocationAssistant

Por

tals

&A

cces

s Po

ints

Applications

Policy & PreferencesConfiguration

Revocation

RiskAssessmentUpdate

ServiceR t Agents

DataStorage

Assistant ApplicationsServicesBusiness Processes

Audit- Data

d C tPrivacy aware

Update

Requests Agents

User

EnterpriseDataRepositories

Disclosure &N tifi ti

and Consent (& Constraints)

- Revocation

Privacy–aware Policy Enforcement Policies

Repositories NotificationManagerService A

-Data and Consent (& Constraints) Notifications(& Constraints)- Revocation

Notifications

Cloud Provider

Service BProvider

Page 48: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Presentation Outline

S tti th C t t Cl d C ti• Setting the Context: Cloud Computing• Identity in the Cloud, Risks and Requirementsy , q• Current Approaches and Initiatives

Towards the Future of Identity in the Cloud• Towards the Future of Identity in the Cloud• Conclusions

Page 49: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Conclusions

• The Cloud and Cloud Computing are Real, Happening Now!p g pp g• Identity & Identity Management have a key role in the Cloud• Need to be aware of Involved Issues and Risks:• Need to be aware of Involved Issues and Risks:

- Lack of Control on Data- Trust on Infrastructure- Privacy Issues- Assurance and Accountability- New Threat Environments

C l it i h dli Id titi- Complexity in handling Identities- Complexity of making informed decisions

• Need to re-think to the Identity Paradigm in the Cloud rather thanjust Adapting Current Solutionsj g

• New Opportunities for Research and Development of Innovative Solutions for various Stakeholders

Page 50: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

Thanks and Q&A

Contact: Marco Casassa Mont, HP Labs, [email protected]

Page 51: The Future of Identity in the Cloud:The Future of …archive.opengroup.org/public/member/proceedings/q209/q...The Future of Identity in the Cloud:The Future of Identity in the Cloud:

4/27/200951 HP Confidential