Welcome!

@CloudExpo Authors: Elizabeth White, Pat Romanski, Liz McMillan, Yeshim Deniz, Aruna Ravichandran

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog, Cloud Security, @BigDataExpo, SDN Journal

@CloudExpo: Article

Erasing the Identity Blind Spot

Using collaborative, integtated ID and Access create key visibility

Security is not an all-or-nothing proposition. And that’s part of the problem. It creates blind spots; gaps in vulnerability. Partly because of the inherent complacency that after a company institutes a new security initiative that hackers will be held at bay, or the employees won’t be tempted to make off with a database or a hundred other internal or external threats.

I have long promoted that security is as much about planning and process as it is about the various solutions that are deployed to protect networks, data, and other assets.

Security is no longer a wall. Stick up a firewall and your customer/user data won’t get leaked. Actually it’s more like a sandwich.  And good security initiatives are like a good Dagwood sandwich - layered and integrated. But even the best sandwiches have holes (if they didn’t, you’d be eating a brick).

So, just as you wouldn’t eat the bread, then eat the meat, then the cheese, and then dip your fingers in the mustard, you shouldn’t deploy firewalls in parallel with intrusion detection, identity management, access management, etc…  The key term here is in “parallel.” As part of your strategic planning, you must recognize that although each has a certain and important function, if they are simply working in parallel and not collaboratively, you are creating significant blind spots.

To illustrate I want to focus on a typical internal threat of unregulated user access.  What happens when employees use web access to process corporate data, including on their own devices? This issue is more than just updating sales call results via salesforce.com or logging in to social media to post about an upcoming promotion. It’s about control and maintaining the control of the IT environment.

With so much data shared beyond the traditional firewall, cloud identity management (credentialing and authorization) is a good starting point, but if you simply allow users a means to enter the castle, what they do once inside still creates risk. Strong identity management not only provides the credentialing gatekeeper (user name, passwords), but must apply use roles-based provisioning to further segment users. In earlier blogs I’ve discussed how not all users are created equal and therefore should not be allowed generic universal access. To further mix my metaphors, think of it like a hotel. Only guests are allowed passed a certain point-and each has access to their own personal space. But only certain guests are allowed into premium areas such as spas or penthouse rooms. The same is true for users and the assets on your extended network.

It is important to recognize that every single user has a unique relationship to your IT environment. Employees, partners, customers, etc… each have their own agenda and their own needs. Credentialing gets them in the door. Provisioning gets them a proverbial room in the hotel. But as mentioned earlier on, that still leaves blind spots. The next obvious step is to integrate access management (single sign on) that automatically leverages roles based provisioning.

By having a single-sign on portal based off of an Active Directory or LDAP controlled identity manager does two things. It provides access to only the relevant applications that a user might need based on their role. Marketing would not see the MySQL apps, Research would not get ADP. However they might need to access Workday or Concur to help manage their timecards. But their identity limits them to just their responsibility (or if they run a department, their subordinates as well). The second provision is that access management can also control non-SAML based (Security Assertion Markup  Language) applications and websites. Not every application is cloud SaaS these days. Upwards of 85% of all applications are non-SAML based (including the legacy application sitting on your server right now!), but still require the same protections. Now you still need SAML, or OAuth or Liberty federation for some applications (especially SaaS that contains sensitive data like GoogleApps or Office365, but to get maximum benefit from integrate IDM/AM you need to incorporate all the apps.

For instance, take Wordpress. It requires a user name and password. It’s not federated via SAML. Although you may not be sharing state secrets on your blog site, it still can be hijacked for disreputable purposes, or be used as a gateway to gain entry into the network. Putting it under the protection of single sign on (under the provisioned protection of identity management), the passwords are secure and the access is limited to only those who need to see it on a user-centric portal. And practically every legacy application is the same way (do you still have MSOffice 2007 on each workstation?).

This plays into two camps of benefit. One is based on productivity and accountability; but that’s on the user (or at least the user’s boss!). To the IT administrator it is all about regaining and maintaining control; not just who gets to see what, but when and how (and leaving the necessary information trail to remediate issues or provide compliance reporting). But in terms of covering those blind spots, you cover all the application (or intranets) directly controlled on your servers, all your SaaS and web-based apps, and all relevant websites.  You now have the visibility to know Rodney from business development is certainly spending a lot of time on Facebook. But if we take this coverage to next logical level and truly erase blind spots, you should think of unifying IDM/AM with other security initiatives such as real time intrusion detection and event archiving as well. That way the visibility extends to knowing when Rodney is logging on and if it is truly him; whether he is using assets at the office, at home or on the road---or if it is someone spoofing his account from an IP address in Outer Mongolia.

There are obviously a great many benefits of an integrated identity and access management deployment, especially when managed from the cloud (security as a service). The cost, the resources, the expanded enterprise capabilities alone make it quite attractive and highly manageable for a SMB or mid-sized company. The CBS Morning Show just did a story on how smaller companies are now squarely in the sights of hackers because of the lower security barriers. The kind of initiative I have described above is typically based on one or the other enterprise solution being on premise (very expensive!). However, evolution and revolution from the cloud is currently available and ready to leverage and collaborate with any existing security plan. (I should know, right?)

Obviously the cure to removing blind spots is better visibility. Better visibility can only be achieved when you can see the entire playing field in front of you. And that can only be achieved when you security solutions work together. And now that is a fast and attainable achievement from the cloud.

Kevin Nikkhoo
Who is now craving a Dagwood sandwich
www.cloudaccess.com

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

@CloudExpo Stories
The session is centered around the tracing of systems on cloud using technologies like ebpf. The goal is to talk about what this technology is all about and what purpose it serves. In his session at 21st Cloud Expo, Shashank Jain, Development Architect at SAP, will touch upon concepts of observability in the cloud and also some of the challenges we have. Generally most cloud-based monitoring tools capture details at a very granular level. To troubleshoot problems this might not be good enough.
The dynamic nature of the cloud means that change is a constant when it comes to modern cloud-based infrastructure. Delivering modern applications to end users, therefore, is a constantly shifting challenge. Delivery automation helps IT Ops teams ensure that apps are providing an optimal end user experience over hybrid-cloud and multi-cloud environments, no matter what the current state of the infrastructure is. To employ a delivery automation strategy that reflects your business rules, making r...
Most technology leaders, contemporary and from the hardware era, are reshaping their businesses to do software. They hope to capture value from emerging technologies such as IoT, SDN, and AI. Ultimately, irrespective of the vertical, it is about deriving value from independent software applications participating in an ecosystem as one comprehensive solution. In his session at @ThingsExpo, Kausik Sridhar, founder and CTO of Pulzze Systems, will discuss how given the magnitude of today's applicati...
Smart cities have the potential to change our lives at so many levels for citizens: less pollution, reduced parking obstacles, better health, education and more energy savings. Real-time data streaming and the Internet of Things (IoT) possess the power to turn this vision into a reality. However, most organizations today are building their data infrastructure to focus solely on addressing immediate business needs vs. a platform capable of quickly adapting emerging technologies to address future ...
Data scientists must access high-performance computing resources across a wide-area network. To achieve cloud-based HPC visualization, researchers must transfer datasets and visualization results efficiently. HPC clusters now compute GPU-accelerated visualization in the cloud cluster. To efficiently display results remotely, a high-performance, low-latency protocol transfers the display from the cluster to a remote desktop. Further, tools to easily mount remote datasets and efficiently transfer...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It’s clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Tha...
In his Opening Keynote at 21st Cloud Expo, John Considine, General Manager of IBM Cloud Infrastructure, will lead you through the exciting evolution of the cloud. He'll look at this major disruption from the perspective of technology, business models, and what this means for enterprises of all sizes. John Considine is General Manager of Cloud Infrastructure Services at IBM. In that role he is responsible for leading IBM’s public cloud infrastructure including strategy, development, and offering ...
Companies are harnessing data in ways we once associated with science fiction. Analysts have access to a plethora of visualization and reporting tools, but considering the vast amount of data businesses collect and limitations of CPUs, end users are forced to design their structures and systems with limitations. Until now. As the cloud toolkit to analyze data has evolved, GPUs have stepped in to massively parallel SQL, visualization and machine learning.
We all know that end users experience the Internet primarily with mobile devices. From an app development perspective, we know that successfully responding to the needs of mobile customers depends on rapid DevOps – failing fast, in short, until the right solution evolves in your customers' relationship to your business. Whether you’re decomposing an SOA monolith, or developing a new application cloud natively, it’s not a question of using microservices – not doing so will be a path to eventual b...
Enterprises are adopting Kubernetes to accelerate the development and the delivery of cloud-native applications. However, sharing a Kubernetes cluster between members of the same team can be challenging. And, sharing clusters across multiple teams is even harder. Kubernetes offers several constructs to help implement segmentation and isolation. However, these primitives can be complex to understand and apply. As a result, it’s becoming common for enterprises to end up with several clusters. Thi...
SYS-CON Events announced today that Taica will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. TAZMO technology and development capabilities in the semiconductor and LCD-related manufacturing fields are among the best worldwide. For more information, visit https://www.tazmo.co.jp/en/.
SYS-CON Events announced today that TidalScale will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. TidalScale is the leading provider of Software-Defined Servers that bring flexibility to modern data centers by right-sizing servers on the fly to fit any data set or workload. TidalScale’s award-winning inverse hypervisor technology combines multiple commodity servers (including their ass...
SYS-CON Events announced today that Avere Systems, a leading provider of hybrid cloud enablement solutions, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Avere Systems was created by file systems experts determined to reinvent storage by changing the way enterprises thought about and bought storage resources. With decades of experience behind the company’s founders, Avere got its ...
Microsoft Azure Container Services can be used for container deployment in a variety of ways including support for Orchestrators like Kubernetes, Docker Swarm and Mesos. However, the abstraction for app development that support application self-healing, scaling and so on may not be at the right level. Helm and Draft makes this a lot easier. In this primarily demo-driven session at @DevOpsSummit at 21st Cloud Expo, Raghavan "Rags" Srinivas, a Cloud Solutions Architect/Evangelist at Microsoft, wi...
The next XaaS is CICDaaS. Why? Because CICD saves developers a huge amount of time. CD is an especially great option for projects that require multiple and frequent contributions to be integrated. But… securing CICD best practices is an emerging, essential, yet little understood practice for DevOps teams and their Cloud Service Providers. The only way to get CICD to work in a highly secure environment takes collaboration, patience and persistence. Building CICD in the cloud requires rigorous ar...
Containers are rapidly finding their way into enterprise data centers, but change is difficult. How do enterprises transform their architecture with technologies like containers without losing the reliable components of their current solutions? In his session at @DevOpsSummit at 21st Cloud Expo, Tony Campbell, Director, Educational Services at CoreOS, will explore the challenges organizations are facing today as they move to containers and go over how Kubernetes applications can deploy with lega...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, will provide a fun and simple way to introduce Machine Leaning to anyone and everyone. Together we will solve a machine learning problem and find an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intellige...
Today most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes significant work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reducti...
As hybrid cloud becomes the de-facto standard mode of operation for most enterprises, new challenges arise on how to efficiently and economically share data across environments. In his session at 21st Cloud Expo, Dr. Allon Cohen, VP of Product at Elastifile, will explore new techniques and best practices that help enterprise IT benefit from the advantages of hybrid cloud environments by enabling data availability for both legacy enterprise and cloud-native mission critical applications. By rev...
SYS-CON Events announced today that Ryobi Systems will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Ryobi Systems Co., Ltd., as an information service company, specialized in business support for local governments and medical industry. We are challenging to achive the precision farming with AI. For more information, visit http:...