Top Banner
Implications for security delivery: Saas, PaaS, and IaaS and virtualized environments Mike Kavis, Inmar VP, Digital Promotions Systems January 24, 2012 JP Morgenthal, Smartronix Cloud Evangelist
9

Service model security implications 2012

May 18, 2015

Download

Technology

Mike Kavis

Mike & JP discuss security for each service model from the perspective of service providers and service consumers.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Service model security implications 2012

Implications for security delivery: Saas, PaaS, and IaaS and virtualized environments

Mike Kavis, InmarVP, Digital Promotions Systems

January 24, 2012

JP Morgenthal, SmartronixCloud Evangelist

Page 2: Service model security implications 2012

®

© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar

2

How do we secure these

different service

models?

Page 3: Service model security implications 2012

®

© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar

3

On Premise

IaaS

PaaSSaaS

Amount of security outsourced

Amou

nt o

f sta

ndar

diza

tion

requ

ired

Service Models Realities

Page 4: Service model security implications 2012

®

© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar

4

On-Premise

Network

Server

Application

ID Management

OS

Authentication

Access

Storage

Authorization

Application configuration

Consumer

It’s ALL you!

Page 5: Service model security implications 2012

®

© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar

5

Network

IaaS

Server

Application

ID Management

OS

Authentication

Access

Storage

Authorization

Application configuration

Consumer

Provider Network

Outsourcing the security perimeter

Server Storage

Page 6: Service model security implications 2012

®

© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar

6

Server OS Storage

PaaS

Application

ID Management

Authentication

Access

Authorization

Application configuration

Perimeter

Server OS Storage

Consumer

Provider

Outsourcing the application platform

Authentication

Page 7: Service model security implications 2012

®

© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar

7

Application Authentication Authorization

SaaS

Perimeter

Server

Application

ID Management

OS

Authentication

Access

Storage

Authorization

Application configuration

Consumer

Provider

Outsourcing the application

Access

Page 8: Service model security implications 2012

®

© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar

Common across all service models

SLAs

Compliance

Privacy

ChangeControl

Controls

Page 9: Service model security implications 2012

For more information:Mike [email protected]

9

JP Morgenthaljpmorgenthal[at]gmail[dot]com