@CloudExpo Authors: Elizabeth White, Pat Romanski, Yeshim Deniz, Liz McMillan, Ram Sonagara

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog, Cloud Security, @DXWorldExpo, SDN Journal

@CloudExpo: Article

Erasing the Identity Blind Spot

Using collaborative, integtated ID and Access create key visibility

Security is not an all-or-nothing proposition. And that’s part of the problem. It creates blind spots; gaps in vulnerability. Partly because of the inherent complacency that after a company institutes a new security initiative that hackers will be held at bay, or the employees won’t be tempted to make off with a database or a hundred other internal or external threats.

I have long promoted that security is as much about planning and process as it is about the various solutions that are deployed to protect networks, data, and other assets.

Security is no longer a wall. Stick up a firewall and your customer/user data won’t get leaked. Actually it’s more like a sandwich.  And good security initiatives are like a good Dagwood sandwich - layered and integrated. But even the best sandwiches have holes (if they didn’t, you’d be eating a brick).

So, just as you wouldn’t eat the bread, then eat the meat, then the cheese, and then dip your fingers in the mustard, you shouldn’t deploy firewalls in parallel with intrusion detection, identity management, access management, etc…  The key term here is in “parallel.” As part of your strategic planning, you must recognize that although each has a certain and important function, if they are simply working in parallel and not collaboratively, you are creating significant blind spots.

To illustrate I want to focus on a typical internal threat of unregulated user access.  What happens when employees use web access to process corporate data, including on their own devices? This issue is more than just updating sales call results via salesforce.com or logging in to social media to post about an upcoming promotion. It’s about control and maintaining the control of the IT environment.

With so much data shared beyond the traditional firewall, cloud identity management (credentialing and authorization) is a good starting point, but if you simply allow users a means to enter the castle, what they do once inside still creates risk. Strong identity management not only provides the credentialing gatekeeper (user name, passwords), but must apply use roles-based provisioning to further segment users. In earlier blogs I’ve discussed how not all users are created equal and therefore should not be allowed generic universal access. To further mix my metaphors, think of it like a hotel. Only guests are allowed passed a certain point-and each has access to their own personal space. But only certain guests are allowed into premium areas such as spas or penthouse rooms. The same is true for users and the assets on your extended network.

It is important to recognize that every single user has a unique relationship to your IT environment. Employees, partners, customers, etc… each have their own agenda and their own needs. Credentialing gets them in the door. Provisioning gets them a proverbial room in the hotel. But as mentioned earlier on, that still leaves blind spots. The next obvious step is to integrate access management (single sign on) that automatically leverages roles based provisioning.

By having a single-sign on portal based off of an Active Directory or LDAP controlled identity manager does two things. It provides access to only the relevant applications that a user might need based on their role. Marketing would not see the MySQL apps, Research would not get ADP. However they might need to access Workday or Concur to help manage their timecards. But their identity limits them to just their responsibility (or if they run a department, their subordinates as well). The second provision is that access management can also control non-SAML based (Security Assertion Markup  Language) applications and websites. Not every application is cloud SaaS these days. Upwards of 85% of all applications are non-SAML based (including the legacy application sitting on your server right now!), but still require the same protections. Now you still need SAML, or OAuth or Liberty federation for some applications (especially SaaS that contains sensitive data like GoogleApps or Office365, but to get maximum benefit from integrate IDM/AM you need to incorporate all the apps.

For instance, take Wordpress. It requires a user name and password. It’s not federated via SAML. Although you may not be sharing state secrets on your blog site, it still can be hijacked for disreputable purposes, or be used as a gateway to gain entry into the network. Putting it under the protection of single sign on (under the provisioned protection of identity management), the passwords are secure and the access is limited to only those who need to see it on a user-centric portal. And practically every legacy application is the same way (do you still have MSOffice 2007 on each workstation?).

This plays into two camps of benefit. One is based on productivity and accountability; but that’s on the user (or at least the user’s boss!). To the IT administrator it is all about regaining and maintaining control; not just who gets to see what, but when and how (and leaving the necessary information trail to remediate issues or provide compliance reporting). But in terms of covering those blind spots, you cover all the application (or intranets) directly controlled on your servers, all your SaaS and web-based apps, and all relevant websites.  You now have the visibility to know Rodney from business development is certainly spending a lot of time on Facebook. But if we take this coverage to next logical level and truly erase blind spots, you should think of unifying IDM/AM with other security initiatives such as real time intrusion detection and event archiving as well. That way the visibility extends to knowing when Rodney is logging on and if it is truly him; whether he is using assets at the office, at home or on the road---or if it is someone spoofing his account from an IP address in Outer Mongolia.

There are obviously a great many benefits of an integrated identity and access management deployment, especially when managed from the cloud (security as a service). The cost, the resources, the expanded enterprise capabilities alone make it quite attractive and highly manageable for a SMB or mid-sized company. The CBS Morning Show just did a story on how smaller companies are now squarely in the sights of hackers because of the lower security barriers. The kind of initiative I have described above is typically based on one or the other enterprise solution being on premise (very expensive!). However, evolution and revolution from the cloud is currently available and ready to leverage and collaborate with any existing security plan. (I should know, right?)

Obviously the cure to removing blind spots is better visibility. Better visibility can only be achieved when you can see the entire playing field in front of you. And that can only be achieved when you security solutions work together. And now that is a fast and attainable achievement from the cloud.

Kevin Nikkhoo
Who is now craving a Dagwood sandwich

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

@CloudExpo Stories
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
The IoT Will Grow: In what might be the most obvious prediction of the decade, the IoT will continue to expand next year, with more and more devices coming online every single day. What isn’t so obvious about this prediction: where that growth will occur. The retail, healthcare, and industrial/supply chain industries will likely see the greatest growth. Forrester Research has predicted the IoT will become “the backbone” of customer value as it continues to grow. It is no surprise that retail is ...
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
DXWorldEXPO LLC announced today that "Miami Blockchain Event by FinTechEXPO" has announced that its Call for Papers is now open. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Financial enterprises in New York City, London, Singapore, and other world financial capitals are embracing a new generation of smart, automated FinTech that eliminates many cumbersome, slow, and expe...
Cloud Expo | DXWorld Expo have announced the conference tracks for Cloud Expo 2018. Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (DX) is a major focus with the introduction of DX Expo within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive ov...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
@DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises - and delivering real results.
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
"We started a Master of Science in business analytics - that's the hot topic. We serve the business community around San Francisco so we educate the working professionals and this is where they all want to be," explained Judy Lee, Associate Professor and Department Chair at Golden Gate University, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
DXWorldEXPO LLC announced today that Dez Blanchfield joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Dez is a strategic leader in business and digital transformation with 25 years of experience in the IT and telecommunications industries developing strategies and implementing business initiatives. He has a breadth of expertise spanning technologies such as cloud computing, big data and analytics, cognitive computing, m...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...