securing your web applications subbaraju uppalapati manager, software engineering identity &...

17
Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

Upload: myron-murphy

Post on 05-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

Securing your Web Applications

Subbaraju UppalapatiManager, Software EngineeringIdentity & Security BU, Novell

Page 2: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

© Novell, Inc. All rights reserved.2

Agenda

• Security Concerns for Web Applications• Solutions• Products and Vendors• Evolving Needs• Discussion

Page 3: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

Security Concerns

Page 4: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

© Novell, Inc. All rights reserved.4

Breaking down security concerns

Trust

• Confidentiality• Integrity• Authentication• Authorization• Non-repudiation• Multiple Identities

Manageability

• Provisioning and De-provisioning of users

• Roles-based access• Policy-driven management

Financial

• Audit, logging, reporting• Cost to refactor traditional applications

Contractual

• Compliance violations• Resource access Monitoring

• Business service mgmt• SLAs, e.g., 99.99% uptime• Intellectual property issues

© Novell, Inc. All rights reserved.

Page 5: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

Security Concerns - Solutions

Page 6: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

© Novell, Inc. All rights reserved.6

SSL

Trust

• Confidentiality• Integrity• Authentication• Authorization• Non-repudiation• Multiple Identities

Manageability

• Provisioning and De-provisioning of users

• Roles-based access• Policy-driven management

Financial

• Audit, logging, reporting• Cost to refactor traditional applications

Contractual

• Compliance violations• Business service mgmt• SLAs, e.g., 99.99% uptime• Intellectual property issues

© Novell, Inc. All rights reserved.

Page 7: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

© Novell, Inc. All rights reserved.7

Access Management

Trust

• Confidentiality• Integrity• Authentication• Authorization• Non-repudiation• Multiple Identities

Manageability

• Provisioning and De-provisioning of users

• Roles-based access• Policy-driven management

Financial

• Audit, logging, reporting• Cost to refactor traditional applications

Contractual

• Compliance violations• Business service mgmt• SLAs, e.g., 99.99% uptime• Intellectual property issues

© Novell, Inc. All rights reserved.

Page 8: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

© Novell, Inc. All rights reserved.8

Access Management

© Novell, Inc. All rights reserved.

Authentication

User Application

User AttributesAuthorization

Policy

PasswordBiometricSmartcard etc.

Assertion

Request

AuthorizationDecision

Permit or Deny

Page 9: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

© Novell, Inc. All rights reserved.9

Identity Management

Trust

• Confidentiality• Integrity• Authentication• Authorization• Non-repudiation• Multiple Identities

Manageability

• Provisioning and De-provisioning of users

• Roles-based access• Policy-driven management

Financial

• Audit, logging, reporting• Cost to refactor traditional applications

Contractual

• Compliance violations• Business service mgmt• SLAs, e.g., 99.99% uptime• Intellectual property issues

© Novell, Inc. All rights reserved.

Page 10: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

© Novell, Inc. All rights reserved.10

Identity Management

• What is the process for

• Provisioning identities?

• Guarding them?

• De-provisioning with role changes?

• Password synchronization across multiple systems

• Policy based workflow

Page 11: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

© Novell, Inc. All rights reserved.11

SIEM

Trust

• Confidentiality• Integrity• Authentication• Authorization• Non-repudiation• Multiple Identities

Manageability

• Provisioning and De-provisioning of users

• Roles-based access• Policy-driven management

Financial

• Audit, logging, reporting• Cost to refactor traditional applications

Contractual

• Compliance violations• Resource access Monitoring

• Business service mgmt• SLAs, e.g., 99.99% uptime• Intellectual property issues

© Novell, Inc. All rights reserved.

Page 12: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

© Novell, Inc. All rights reserved.12

SIEM

• How do you find out what’s going on inside your vendor’s data center?

• How do you check up on SLA terms?

• Can you reconcile information you do receive with the rest of your compliance data?

Page 13: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

© Novell, Inc. All rights reserved.13

Products and Vendors

IAM

• IBM – TIM/TAM• CA - SiteMinder• Oracle IAM• Novell – IDM/NAM

SIEM

• ArcSight• RSA - enVision• Novell - Sentinel

© Novell, Inc. All rights reserved.

Page 14: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

Evolving Needs

Page 15: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

© Novell, Inc. All rights reserved.15

Creating IT Administration Nightmare

User data/permissions

Systems/tools

Directory

AppsIT Department

Users

Enterprise Challenge

Multiple Username/ passwords

Multiple identity silos

Disparate administration tools

Challenge in timely de-provisioning accounts of ex-employees

User data/permissions

User data/permissions

User data/permissions

User data/permissions

User data/permissions

Page 16: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

© Novell, Inc. All rights reserved.16

Better integration of IAM and SIEM across PVC• SaaS adoption is projected to increase three-fold to $14 Billion by 2012 according to Gartner

• Secure data should reside within Enterprise• Increased proliferation of Web Services and Security needs for the same

• How do I manage secure channel b/w multiple cloud vendors?

Page 17: Securing your Web Applications Subbaraju Uppalapati Manager, Software Engineering Identity & Security BU, Novell

Discussion – Thank You