ApTSi Security Architecture...

37
>ApTSi TM –Applying Technology to Solve Business Problems ApTSi TM Security Architecture Communications >Applied Technology Solutions Inc (ApTSi TM ) >Applied Technology Solutions, Inc.(ApTSi TM ) Applying Technology to Business Problems TM Understanding the role of security on SOA and Cloud Computing: a reference model, governance, issues and b t ti best practices The Open Group Security Practitioners Conference, The Open Group Security Practitioners Conference, San Diego, Feb 5 th , 2009 © Copyright 2009 Applied Technology Solutions, Inc. 1 The Open Group Security Practitioners Conference Feb 2009

Transcript of ApTSi Security Architecture...

Page 1: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

ApTSi TM Security Architecture Communications

>Applied Technology Solutions Inc (ApTSiTM) >Applied Technology Solutions, Inc.(ApTSiTM) Applying Technology to Business ProblemsTM

Understanding the role of security on SOA and Cloud Computing: a reference model, governance, issues and

b t tibest practices

The Open Group Security Practitioners Conference,The Open Group Security Practitioners Conference,San Diego, Feb 5th, 2009

© Copyright 2009 Applied Technology Solutions, Inc.

1The Open Group Security Practitioners Conference Feb 2009

Page 2: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSi TM – Applying Technology to Solve Business Problems TM

Introductions

• Feb 5th 2009• Feb 5th, 2009• Name TitleApTSi TM

• Leadership• World Class

Technology• Experience

• Nikhil Kumar PresidentCo-Chair SOA Reference Architecture Project, The Open Group

ApTSiApplied Technology Solutions, Inc.

• Experience

• Strategy• Integration & SOA•• Application

Development & Reuse

• DB, EII & BI,

Nikhil Kumar PresidentEmail: [email protected]: http://blogs.ittoolbox.com/emergingtech/nikhilPhone: (248) 797 8143

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

2

Page 3: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

• A Reference Model for SOA Security• Modeling and addressing “traditional” SOA

>ApTSiTM – Applying Technology to Solve Business Problems

Agenda

Security – Review CIA-TRIAD and AAA approachpp

• Security issues that ariseThe importance of securing data at flight and rest– The importance of securing data at flight and rest

– SOA issuesWh d t di t• Who are we: understanding our ecosystem

• The SOA effect – not knowing who we will be• In the small: at a service level• In the small: at a service level

– Key issues » Trust, Authentication and Authorization» Confidentiality» Integrity and Non-repudiation» Audit» Audit» Contracts and guards

• In the large – crossing borders© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

3In the large crossing borders

– Federation and its implications» Trust, authentication and authorization

Page 4: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Agenda

•• Security, SOA, SOI, Infrastructure Virtualization, Security, SOA, SOI, Infrastructure Virtualization, Software as a Service and the Cloud Software as a Service and the Cloud

• A Reference Model for SOA SecurityA Reference Model for SOA Security• Modeling and addressing “traditional” SOA Security • Security issues that arise• Security issues that arise• SaaS and its implications• SOI and Infrastructure Virtualization• Address the cloud• Governance and Security• Summary and ConclusionsSummary and Conclusions

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

4

Page 5: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Security, SOA, SOI, SAAS, cloud computing, Infrastructure Virtualization and shared services

Understanding and establishing a contextual base:

Service-Oriented Architecture (SOA) has been defined by the Open Group as an architectural style that supports serviceService Oriented Architecture (SOA) has been defined by the Open Group as an architectural style that supports service orientation.

An architectural style is the combination of distinctive features in which architecture is performed or expressed.

A service: – Is a logical representation of a repeatable business activity that has a specified outcome (e.g., check customer credit;

provide weather data, consolidate drilling reports) – Is self-contained – May be composed of other services – Is a “black box” to consumers of the service

There are multiple perspectives of SOA which address it from a business context, where organizations align themselves and theirvalue chain around a service centric model (the Service Oriented Enterprise), a technical and operational context and from a governance context

It is important to take these 3 perspectives (business, technology and governance) into consideration to be able to understand the implications of SOA

Shared Services, SaaS, Cloud Computing, SOI and Infrastructure Virtualization are all extensions of SOA, and represent the natural evolution of SOA. On the next slide we describe these terms and complete with a review of the evolution of SOA

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 20095

Page 6: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSi TM – Applying Technology to Solve Business Problems TM

The future services ecosystemThe future services ecosystem

SOA 2.0SOA 2.0

Web 2.0 Web 2.0 – the Consumer of the future (it will be channel agnostic)

Cloud Computing

Software as a Service (SAAS)

Application Virtualizationp g( )

SOI/ Infrastructure Virtualization

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

6

Page 7: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Security, SOA, SOI, SAAS, cloud computing, Infrastructure Virtualization and shared services

Understanding and establishing a contextual base – the new SOA

Shared Services are services which are shared (used) by other services Attributes which delineate themShared Services are services which are shared (used) by other services. Attributes which delineate them Include reuse, agility, fiscal governance, decision right and ownership issues, quality of service, security,privacy and compliance issues, provisioning and interoperability being more important than single, one-time used servicesused services

Software As A Service Software as a service occurs when organizations define business process and coreSoftware As A Service – Software as a service occurs when organizations define business process and core capabilities in terms of a service. These services can then be provided by any service provider.

These services are inherently services which are shared and all of the above attributes of sharedThese services are inherently services which are shared, and all of the above attributes of shared services apply. Software as a service may be provided by either elements within an enterprise or across enterprise domains. The perimeter is rapidly becoming meaningless.domains. The perimeter is rapidly becoming meaningless.The most compelling aspect of SaaS is the agility and cost reduction that arises. SaaS represents the true commoditization of IT.The Business Implications are extraordinary.The Business Implications are extraordinary.

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 20097

Page 8: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Security, SOA, SOI, SAAS, cloud computing, Infrastructure Virtualization and shared services

Understanding and establishing a contextual base – the new SOA

Service Oriented Infrastructure (SOI) and Infrastructure Virtualization:Service Oriented Infrastructure is the definition of key infrastructural capabilities in a service oriented manner and the supporting attributes that infrastructure may be involved.

Infrastructural Virtualization is the process of providing infrastructure in a virtualized manner, where the location of the infrastructure and the environment that it runs in are theoretically unimportant to the user. Important characteristics include:

The categorization of the virtualized infrastructure into “physical infrastructure” – such as operating systems and hardware, and “application infrastructure” – such as “cloud application servers”Th f th i f ti th d t d th i t ll l lThe governance of the information, the data and the services – at all levels

Cloud Computing: is the running of services in a virtualized fashion in a cloud – including other business i th th t t i d ib d b li ti i d i f t t iservices as the other two categories described above – application services and infrastructure services

Web 2.0: Web 2.0 can be envisioned as the consumer layer of these capabilities that represent the future. f fThe other capabilities provide the underlying basis for this. There are domain specific and societal

implications of Web 2.0, with new business models and new roles

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 20098

Page 9: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSi TM – Applying Technology to Solve Business Problems TM

SOA EvolutionWither now? The Future and the Present

SOA 0.0SOA 0.0 SOA 1.0SOA 1.0 SOA 2.0SOA 2.0 SOA 3.0SOA 3.0

Web ServicesAre SOA

SOA and ReuseUnderstanding

Evolves/Advent of

Web 2.0/ Service Categorization/C ll b i

Software as a Service (SAAS)/

Service P i i i / SOI/

SOA 0.0SOA 0.0 SOA 2.0SOA 2.0

Governance Collaboration Provisioning/ SOI/ Cloud Computing

Pervasive Computing/Agent Based

Security ImplicationsSecurity ImplicationsWeb 2.0 Web 2.0 The The shareabilityshareability of data/ absence of perimeters/ data tracking in longof data/ absence of perimeters/ data tracking in long--tail tail

scenarios, the impact ofscenarios, the impact of mashupsmashups and technologies such as AJAXand technologies such as AJAXAgent BasedService/ Adaptive

Systems

SOA 4 0SOA 4 0

scenarios, the impact of scenarios, the impact of mashupsmashups and technologies such as AJAXand technologies such as AJAX

Service Categorization Service Categorization The impact of service The impact of service shareabiltiyshareabiltiy and the impact of header and the impact of header information on the datainformation on the data

Collaboration Collaboration the creation of composed and orchestrated solutions. Security impacts the creation of composed and orchestrated solutions. Security impacts SOA 4.0SOA 4.0 p y pp y pinclude the impact of composition and the associated privileges of the composed or include the impact of composition and the associated privileges of the composed or collaborating servicescollaborating services

SAAS SAAS Interoperability, Security and Compliance, Interoperability, Security and Compliance, QoSQoS and Temporal differences, and Temporal differences, Coupling and dependenciesCoupling and dependenciesCoupling and dependenciesCoupling and dependencies

SOI SOI Data Integrity, Interoperability impact of platforms and SOI solutions (e.g. impact of Data Integrity, Interoperability impact of platforms and SOI solutions (e.g. impact of ACEACE--ML)ML)

Cloud ComputingCloud Computing Portability, vendor independence, scalability,Portability, vendor independence, scalability, QoSQoS and governance,and governance,

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

Cloud Computing Cloud Computing Portability, vendor independence, scalability, Portability, vendor independence, scalability, QoSQoS and governance, and governance, security, compliance, loss of the perimetersecurity, compliance, loss of the perimeter 9

Page 10: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Agenda

• Security, SOA, SOI, Infrastructure Virtualization, Software as a Service and the Cloud

•• A Reference Model for SOA SecurityA Reference Model for SOA Security• Modeling and addressing “traditional” SOA Security• Modeling and addressing traditional SOA Security • Security issues that arise• SaaS and its implications• SOI and Infrastructure Virtualization• Address the cloud• Governance and SecurityGovernance and Security• Summary and Conclusions

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

10

Page 11: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

Future State “Actionable Architecture TM Reference Model: Deployment Layers in the Runtime

>ApTSiTM – Applying Technology to Solve Business Problems>ApTSi TM – Applying Technology to Solve Business Problems TM>ApTSi TM – Applying Technology to Solve Business Problems TM

The Actionable Architecture TM of the future will support a channel independent structure that will support varying sources of data, drive unified data views, be interoperable and service oriented and apply application

i i l l i i f i composition to wrap legacy solutions into future state services .

P t l P t l ( h l i d d )ity,

Portal Portal (channel independence)

SOAerns

tero

pera

bil

)

D t M di ti

SOA

L L

ApplnAppln. Composition. Composition

g C

once

e (Q

oS),

Int

chite

ctur

e MDM, etc.MDM, etc.

Data Mediation (EII/ ETL/ CDC/ etc.))

Legacy Legacy ApplicationsApplications

s-cu

ttin

gy

of S

ervi

cerm

atio

n A

r

DatasourceDatasource

Cro

ssri

ty, Q

ualit

yIn

for

Data Storage

(Sec

ur

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

11

Page 12: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

SOA Reference Model: Layers and Responsibilities for a Run Time SOA Architecture

>ApTSiTM – Applying Technology to Solve Business Problems

EnterpriseEnterprise--Wide Wide

CommonCommonConcernsConcerns

ClientBP

ClientBP

ClientBP

ClientBP

ClientBP

ClientBP - EII

ConsumerConsumerService Service TierTier

Consumer Processes: Consumer Processes: Client AgnosticClient Agnostic

SecuritySOASOA Service

Discovery/ Visibility

ntnt ppor

t; Poli

cy

oring

Client agnostic

Workflow and BPMWorkflow and BPM

Service Orchestration/ Composition Human Intervention

BEPL/ BPMN

EII /Data EII /Data Virtualization/ Virtualization/

ent M

onito

ring

ert N

otifi

catio

n

Registrynage

men

nage

men

A; S

tanda

rds S

uor

ceme

nt, M

onito

ESBESB

Service Orchestration/ Composition Human InterventionVirtualization/ Virtualization/ Information Information ServicesServices

ESBESBService Service TiTi

Eve Ale

Virtua-lization

g y• Service Discovery

rvic

es M

arv

ices

Ma

tegra

tion I

nto S

Odia

tion;

QoS

Enfo ESBESB

Provisioning: EndpointsService Orchestration/ Composition

TierTier • Service Description

•VersioningWeb

Ser

Web

Ser

utting

Con

cern

Int

ment;

Ser

vice M

ed

Messaging Services:Content-based Routing; Guaranteed delivery; Integration Adapters Rules

Inf

TradingTrading P2P

• Virtualization

Cros

s-Cu

Enfor

cem

Application Integration: WS based exposure

Inf. Arch.

Producer TierProducer Tier

AA

Trading Trading PartnersPartners

A A

ProducerProducerProcessesProcesses

Service Binding

SOAP Stack

Service Binding

Application Comp.

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 200912

App nApp n App n App n

Page 13: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

The Security Reference Model: applied to ApTSi’s Actionable Enterprise Architecture

Security needs to address the flow of data across the SOA. This includes data at rest and data in flight.

Cross-cutting security constraints:

Confidentiality, Integrity, Availability, Audit, Authentication, Authorization

Security Constraints apply across all layers of a consumer producer interaction

Security has to address CIA Triad and AAA

SOAProvider including the service façade and the

Data in flightData in flight

SOA

P id

se ce açade a d edata source

Consumer(Portal/ Service)

Provider Service/sSOA standards such as

SAML, XACML and WS* specs support

Data may be structured or

t t dService) specs. support interoperability

unstructuredData Source

Data at restData at rest

© Copyright 2009 Applied Technology Solutions, Inc. 13

The Open Group Security Practitioners Conference Feb 2009

Page 14: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

Service interaction, Chaining and Composition in a runtime SOA environment

>ApTSiTM – Applying Technology to Solve Business Problems

Security needs to address the flow of data across the SOA. This includes data at rest and data in flight.

Cross-cutting security:Security is a cross-cutting constraint

Confidentiality, Integrity, Availability, Audit, Authentication, Authorization

Security is a cross cutting constraint

ProviderS i

S1 S2 S3 S4

SOAService interaction needs

Consumer(Portal/

Service

S i The impact of Service

S5

The consumer/ provider Service interaction needs to address:

1. Interaction across trust domains

(Service)

Service Component

The impact of Service chaining is that security needs to be addressed at a service level:

The consumer/ provider model leads to thinking about SOA in a holistic context:

1. Service consumers must 2. Interaction between

services, most often due to the chaining of services

Data Source1. Trust– service clients can and will change over time

2. Authorization

be traceable

2. As services are reused, there should not be tight coupling between a

3. Possibilities of varying consumer and provider lists

3. Audit

4. Possibilities of varying consumer and provider

p gconsumer and a producer.

3. Providers and the underlying data sources also have contractual

© Copyright 2009 Applied Technology Solutions, Inc. 14

listsalso have contractual commitments

The Open Group Security Practitioners Conference Feb 2009

Page 15: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

The Security Reference Model: applied to ApTSi’s Actionable Enterprise Architecture: Future state scenarios (the Cloud, SOI and Infrastructure Virtualization)

Cross-cutting security constraints:

Security Constraints apply across all layers of a consumer producer interaction

Security has to address CIA Triad and AAA

Confidentiality, Integrity, Availability, Audit, Authentication, Authorization

SOA

Security has to address CIA Triad and AAA

Provider including the service façade and the

Data in flightData in flight

SOA çdata source

Consumer(Portal/ Service)

SOA standards such as SAML, XACML and WS* specs. support interoperability Application Virtualization

Provider Service/s

DService) interoperability

Data at restData at rest

Application VirtualizationDataSource

I f S /

H/W Virtualization

Infrastructure Service/s

Cloud Cloud

© Copyright 2009 Applied Technology Solutions, Inc. 15

The Open Group Security Practitioners Conference Feb 2009

Page 16: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

Service interaction, Chaining and Composition in a runtime SOA environment

>ApTSiTM – Applying Technology to Solve Business Problems

The Open Group SOA RA – High-Level Perspective

Consumer Consumer I t fI t fConsumer Consumer I t fI t fInterfacesInterfacesInterfacesInterfaces

Business Business ProcessesProcessesBusiness Business ProcessesProcesses

IntegraIntegraIntegraIntegra

Quality

Quality

Quality

Quality

InformInformInformInform

Gover

GoverProcessesProcessesProcessesProcesses

ServicesServicesServicesServices

ationationationation

y of Ser

y of Ser

y of Ser

y of Ser

mation

mation

mation

mation

rnancernance

Service Service ComponentsComponentsService Service ComponentsComponents

rvicervicervicervice

pppp

Operational Operational SystemsSystemsOperational Operational SystemsSystemsyyyy

© Copyright 2009 Applied Technology Solutions, Inc.

(C) The Open Group 2009 16

The Open Group Security Practitioners Conference Feb 2009

Page 17: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Agenda

• Security, SOA, SOI, Infrastructure Virtualization, Software as a Service and the Cloud

• A Reference Model for SOA Security•• Modeling and addressing “traditional” SOAModeling and addressing “traditional” SOA•• Modeling and addressing traditional SOA Modeling and addressing traditional SOA

Security Security • Security issues that arise• SaaS and its implications• SOI and Infrastructure Virtualization• Address the cloudAddress the cloud• Governance and Security

Summary and Conclusions• Summary and Conclusions

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

17

Page 18: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

The Security Reference Model: applied to ApTSi’s Actionable Enterprise Architecture: Future state scenarios (the Cloud, SOI and Infrastructure Virtualization)

Cross-cutting security constraints:

Security Constraints apply across all layers of a consumer producer interaction

Security has to address CIA Triad and AAA

Confidentiality, Integrity, Availability, Audit, Authentication, Authorization

SOA

Security has to address CIA Triad and AAA

Provider including the service façade and the

Data in flightData in flight

SOA çdata source

Consumer(Portal/ Service)

SOA standards such as SAML, XACML and WS* specs. support interoperability Application Virtualization

Provider Service/s

DService) interoperability

Data at restData at rest

Application VirtualizationDataSource

I f S /

H/W Virtualization

Infrastructure Service/s

Cloud Cloud

© Copyright 2009 Applied Technology Solutions, Inc. 18

The Open Group Security Practitioners Conference Feb 2009

Page 19: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Modeling and Addressing “Traditional” SOA Security

Apply the CIA Triad and AAA:– Security at the Service Level:

• Address the transportNon repudiation– Non-repudiation

– Integrity – Encryption

• Address the potential for storageAddress the potential for storage• Make it atomic

– Security and Availability • QoS

– Security at the Service Level• Understand the data

U d t d th it t i t t d b th i• Understand the security constraints supported by the service – Model the constraints as a part of the service contract– Ensure that they are enforceable in the for of rule

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 200919

y

Page 20: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Modeling and Addressing “Traditional” SOA Security

Apply the CIA Triad and AAA:– Confidentiality

– How are the service contract and service pre-conditions supporting confidentiality?– What is the role of the supporting elements of the SOA?pp g

» How does this impact the physical interaction including the transport medium?» How does this impact? <?>

– How does this impact the Service?It l i th t diti th t th i i itt d t f t» Its role in the post-conditions that the service is committed to conform to

» Its role in the pre-conditions that the consumer’s request must be validated against– How does this impact the service provider (the service component)?

– Non-repudiation• Try and establish a consistent framework which cross-cuts from an enterprise y p

perspective• Use a data-classification strategy to help determine the level and nature of non-

repudiation required• Add it to the SOA strategy and governance frameworks• Ensure that there is a review and design process at a service level from the perspective

of ensuring that non-repudiation is assured across the SOA continuum.

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 200920

Page 21: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Modeling and Addressing “Traditional” SOA Security

Apply the CIA Triad and AAA:

– Integrity• Establish transaction integrity classification. This may be driven by standards (for

example Sarbanes Oxley 404) and will normally need to address both data at rest and in flight.

• Look to data classification to create a framework for SOA• Look to data classification to create a framework for SOA • In the design guidance framework ensure that the entire service chain addresses

integrity. Integrity translates to encryption and non-repudiation as we try to ensure that the data traversing from a service provider to a service consumer stays valid.e da a a e s g o a se ce p o de o a se ce co su e s ays a d

– Availability:y• From the SOA strategy process where capabilities are defined and

infrastructure determinedF th SOA d i• From the SOA design process

• From the operationalization process• From the run-time monitoring process

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 200921

From the run time monitoring process.

Page 22: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Modeling and Addressing “Traditional” SOA Security

Apply the CIA Triad and AAA:– Authentication (and trust establishment)

• Federated and non-federated scenariosDi t ib ti f th t t ti d f d ti• Distribution of the trust assertion and federation

– Authorization• Entitlements• Content level entitlements• Policies and PEP’s• Policies and PEP s• Validate the consumer • Entitlements based on data levels

– Audit • Know who started the chain and the consumer• Know who started the chain and the consumer• Obfuscate some data

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 200922

Page 23: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Agenda

• Security, SOA, SOI, Virtualization, Software as a Service and the Cloud

• A Reference Model for SOA Security• Modeling and addressing “traditional” SOA Security •• Security issues that ariseSecurity issues that ariseSecurity issues that ariseSecurity issues that arise• SaaS and its implications• SOI and Infrastructure Virtualization• SOI and Infrastructure Virtualization• Address the cloud• Governance and Security• Summary and Conclusions

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

23

Page 24: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Agenda

• Security issues that arise– The importance of securing data at flight and restThe importance of securing data at flight and rest

– SOA issues• Who are we: understanding our ecosystem• Who are we: understanding our ecosystem• The SOA effect – not knowing who we will be• In the small: at a service levelIn the small: at a service level

– Key issues » Trust, Authentication and Authorization» Confidentiality» Integrity and Non-repudiation» Audit» Contracts and guards

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

24

Page 25: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Agenda

• Security issues that arise– SOA issues

• In the large – crossing bordersIn the large crossing borders– Federation and its implications

» Trust, authentication and authorization» Trust, authentication and authorization» Identity and its role (refer to Stuart and Dennis’s

presentation)» Contract implications» Remember the message

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

25

Page 26: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Agenda

• Security issues that arise– The importance of securing data at flight and rest

– SOA issues• Audit and its opportunity

– What do I audit– What do I obfuscate?– Do I lose my integrity?

– Maturity and its impact• You plan your SOA rollout, so why don’t you tie your security p y , y y y y

rollout there too• So how about dancing? Learn the fandango!

– Security and Service contracts

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

26

Page 27: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Agenda

• Security, SOA, SOI, Virtualization, Software as a Service and the Cloud

• A Reference Model for SOA Security• Modeling and addressing “traditional” SOA Security • Security issues that ariseSecurity issues that arise•• SaaSSaaS and its implicationsand its implications• SOI and Infrastructure Virtualization• SOI and Infrastructure Virtualization• Address the cloud• Governance and Security• Summary and Conclusions

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

27

Page 28: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

SAAS and its Implications

• Federation– ID Management– Trust– Levels of trust

Ch I t h P id Ch• Change Impact – when Providers Change• Service Chaining and not knowing who isService Chaining and not knowing who is

providing the information• New Versions

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

28

Page 29: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

SOI and Infrastructure Virtualization

• Security, SOA, SOI, Virtualization, Software as a Service and the Cloud

• A Reference Model for SOA Security• Modeling and addressing “traditional” SOA Security • Security issues that ariseSecurity issues that arise• SaaS and its implications•• SOI and Infrastructure VirtualizationSOI and Infrastructure Virtualization•• SOI and Infrastructure VirtualizationSOI and Infrastructure Virtualization• Address the cloud• Governance and Security• Summary and Conclusions

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

29

Page 30: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

SOI and Infrastructure Virtualization

• Application Virtualization– Where does the Application Run?– What happens when it crashes – DR and Availability– What happens when it changes?– Can I trust my neighbor?

• Infrastructure VirtualizationInfrastructure Virtualization– Similar Questions– Need to manage securely how we accessNeed to manage securely how we access– Need to manage data at rest– Need to be careful of how we integrateNeed to be careful of how we integrate

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

30

Page 31: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

SOI and Infrastructure Virtualization

• Security, SOA, SOI, Virtualization, Software as a Service and the Cloud

• A Reference Model for SOA Security• Modeling and addressing “traditional” SOA Security • Security issues that ariseSecurity issues that arise• SaaS and its implications• SOI and Infrastructure Virtualization• SOI and Infrastructure Virtualization•• Address the cloudAddress the cloud• Governance and Security• Summary and Conclusions

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

31

Page 32: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Address the Cloud

• The issues of Application and Infrastructure Virtualization apply

• When we deal with the cloud the entireWhen we deal with the cloud the entire deployment process is an issueA f th i i• Access of the resources is an issue

• Data needs to be doubly securey• Audit data still needs to be captured

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

32

Page 33: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

SOI and Infrastructure Virtualization

• Security, SOA, SOI, Virtualization, Software as a Service and the Cloud

• A Reference Model for SOA Security• Modeling and addressing “traditional” SOA Security • Security issues that ariseSecurity issues that arise• SaaS and its implications• SOI and Infrastructure Virtualization• SOI and Infrastructure Virtualization• Address the cloud•• Governance and SecurityGovernance and Security• Summary and Conclusions

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

33

Page 34: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

SOA Security Governance: Topics to cover

– Strategic Governance – Portfolio Management

Development Lifecycle Governance– Development Lifecycle Governance– Operationalization Governance– Metrics and Compliance

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

34

Page 35: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSiTM – Applying Technology to Solve Business Problems

Security for SOA: The Current and the Future

Defining issues for current state Defining issues for current stateSOASOA

1. Security from a data at rest and a data in flight perspective

SOA1. The evolution of circles of trust, information

architecture and multiple service environments2. Understanding service security within the

context of a service1. The service contract2 Physical interface level security

environments

2. Focused on system requirements1 Interoperability at a system level2. Physical interface level security

3. Understanding service security within the context of a service chain (orchestration/ composition scenarios)

1. Interoperability at a system level2. Data Model is the vehicle for

communication3 Normally deals with persistence and not

4. Audit implications3. Normally deals with persistence and not

transport of data

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 200935

Page 36: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSi TM– Applying Technology to Solve Business Problems TM

Conclusion

Understanding the role of security on SOA and Cloud Computing: a f d l i d b t tireference model, governance, issues and best practices

What we have covered

1. Background and Understanding2. Key Elements of SOA Security and some issues associated with SAAS/ Cloud

Not Covered1. Patterns2 TOGAF2. TOGAF

Thank you!

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

36

Page 37: ApTSi Security Architecture Communicationsarchive.opengroup.org/public/member/proceedings/q...Security, SOA, SOI, SAAS, cloud computing, Infr astructure Virtualization and shared services

>ApTSi TM – Applying Technology to Solve Business Problems TM

Thank you!

• Feb 5th 2009• Feb 5th, 2009• Name TitleApTSi TM

• Leadership• World Class

Technology• Experience

• Nikhil Kumar PresidentCo-Chair SOA Reference Architecture Project, The Open Group

ApTSiApplied Technology Solutions, Inc.

• Experience

• Strategy• Integration & SOA•• Application

Development & Reuse

• DB, EII & BI,

Nikhil Kumar PresidentEmail: [email protected] htt //bl itt lb / i t h/ ikhilBlog: http://blogs.ittoolbox.com/emergingtech/nikhilPhone: (248) 797 8143

© Copyright 2009 Applied Technology Solutions, Inc. The Open Group Security Practitioners Conference Feb 2009

37