Service model security implications 2012

Post on 18-May-2015

819 views 1 download

Tags:

description

Mike & JP discuss security for each service model from the perspective of service providers and service consumers.

transcript

Implications for security delivery: Saas, PaaS, and IaaS and virtualized environments

Mike Kavis, InmarVP, Digital Promotions Systems

January 24, 2012

JP Morgenthal, SmartronixCloud Evangelist

®

© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar

2

How do we secure these

different service

models?

®

© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar

3

On Premise

IaaS

PaaSSaaS

Amount of security outsourced

Amou

nt o

f sta

ndar

diza

tion

requ

ired

Service Models Realities

®

© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar

4

On-Premise

Network

Server

Application

ID Management

OS

Authentication

Access

Storage

Authorization

Application configuration

Consumer

It’s ALL you!

®

© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar

5

Network

IaaS

Server

Application

ID Management

OS

Authentication

Access

Storage

Authorization

Application configuration

Consumer

Provider Network

Outsourcing the security perimeter

Server Storage

®

© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar

6

Server OS Storage

PaaS

Application

ID Management

Authentication

Access

Authorization

Application configuration

Perimeter

Server OS Storage

Consumer

Provider

Outsourcing the application platform

Authentication

®

© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar

7

Application Authentication Authorization

SaaS

Perimeter

Server

Application

ID Management

OS

Authentication

Access

Storage

Authorization

Application configuration

Consumer

Provider

Outsourcing the application

Access

®

© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar

Common across all service models

SLAs

Compliance

Privacy

ChangeControl

Controls

For more information:Mike Kavismichael.kavis@inmar.com

9

JP Morgenthaljpmorgenthal[at]gmail[dot]com