oasis workshop: identity, privacy, and data protection in the cloud – what is being done? is it...

28
Identity, Privacy, and Data Protection in the Cloud – XACML David Brossard Product Manager, Axiomatics 1

Upload: david-brossard

Post on 15-Jan-2015

250 views

Category:

Technology


0 download

DESCRIPTION

Join a host of industry experts for this pre-conference roundtable, to hear the latest on what is being done to protect identity and ensure privacy within the cloud. This three-part interactive roundtable will open-up the dialogue on this topic, so come prepared to share information, insights and ideas.

TRANSCRIPT

Page 1: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

1

Identity, Privacy, and Data Protection in the Cloud – XACML

David BrossardProduct Manager, Axiomatics

Page 2: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

2

The issue with authorization in the cloudQuick background on XACML3 strategies to extend authorization to the CloudWhat it means for

customersSaaS providers

What you will learn

Page 3: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

3

The issue with Authorization today

The black box challenge

Page 4: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

4

System growth leads to AuthZ challenges

App

App

App

Cost

Brittleness

Static

Risk

Lack of visibility

Lack of audit

Violation of SoD

SaaS

SaaS

SaaS

Page 5: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

5

What happens to my data?Who can access which information?How do I comply with (what the auditor will ask for)

Regulations? E.g. Export Control

Contractual obligations?

Going to the cloud doesn’t make it easierDo I need a different approach for cloud?

The Authorization Challenge

Page 6: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

6

Export ControlKnow the user (citizenship, location, affiliation)Know the end use (end location, purpose of use)

Example: Manufacturing in the cloud

Page 7: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

7

XACML to the rescue

Implementing fine-grained authorization in the cloud

Page 8: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

8

Authorization is nearly always about

Who?

Identity + role (+ group)

Role-based

Access

Control

Page 9: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

9

Authorization should really be about…

When?What? How?Where?Who? Why?

Attribute-

based

Access

Control

Page 10: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

10

eXtensible Access Control Markup LanguageOASIS standardXACML is expressed as

A specification document (a PDF) + XML schema

Policy-based & attribute-based languageImplement authorization based on object relationsOnly employees of a given plant can see technical data linked to items assigned to the plant

Behold XACML, the standard for ABAC

Page 11: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

11

OracleIBMVeterans AdministrationAxiomaticsEMC2

Bank of AmericaThe Boeing CompanyAnd many more…

Who’s behind XACML?

Page 12: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

12

Refresher: the XACML architecture

DecidePolicy Decision Point

ManagePolicy Administration Point

SupportPolicy Information PointPolicy Retrieval Point

EnforcePolicy Enforcement Point

Page 13: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

13

XACML Transparent & Externalized AuthZCentrally managed policy: ”PERMIT user with clearance X to read document classified as ….”“DENY access to classified document if…”

User Application

Informationasset

I want…

PERMITorDENY?

PERMITorDENY?

Page 14: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

14

XACML Anywhere AuthZ & Architecture

Datacenter

App AService A

Service D

Service E

Service M

Service O

SaaS SaaSPrivate Cloud

Page 15: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

15

Fine-grained Authorization for the Cloud

Three strategies for externalized authorization in the cloud

Page 16: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

16

A SaaS provider should offerFunctional APIs (their core business)Non-functional (Security) APIs

Let customers push their own XACML policiesApply the administrative delegation profile

http://docs.oasis-open.org/xacml/3.0/xacml-3.0-administration-v1-spec-en.html

Option #1 – tell your provider to adopt XACML

Page 17: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

SaaS provider

Option #1 – Architecture

Central IT:Company A

SaaS Admin delegates rights to manage access control provided to customer A. The rights are restricted to only the applications and resources provided to this particular customer’s users.

Customer A’s admin can manage access for their staff on its own by providing XACML policies and attributes

Customer A users use the SaaS application

17

App#1

App#2

App#3

Func

tiona

l API

XACML Mgmt

API

1.

2.

3.

Page 18: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

SaaS provider

Option #1 – Architecture (including id. Federation)

Central IT:Company A

18

STSIdP STS

1. User authenticates using internal authentication mechanism and id store (e.g. LDAP)

2. User calls out to SaaS application

3. User internal identity is translated to virtual identity e.g. SAML assertion

message saml message

5. User message is forwarded to SaaS app along with SAML assertion

4. Internal user identity is verified. User attributes are inserted inside newly created SAML assertion

6. SAML assertion is validated against local STS. Attributes are extracted from SAML assertion and returned

Trust establishment

App#1

App#2App#3

7. XACML AuthZ request including the attributes from the SAML assertion are sent to the PDP for a decision

Page 19: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

19

ProsConsistent access controlFine-grainedRisk-awareFuture-proofSaaS vendor benefit

multi-tenancy

ConsNot many SaaS vendors support XACML today

Option #1 – Pros & Cons

Page 20: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

20

If you can restrict access to SaaS applications from within the corporate network…All access to SaaS apps could be made to tunnel through a proxy

Option #2 – Proxy your cloud connections

Page 21: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

21

Option #2 – Architecture

SaaS App #1

SaaS App #2

SaaS App #3

VPN

Page 22: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

22

ProsWorkaround current SaaS limitationsEasy to deployAvailable today

ConsNo direct access to SaaS app

Forces users to go via VPN

Access may not be as fine grained as Option #1

Lack of visibility into the SaaS data

Option #2 – Pros & Cons

Page 23: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

23

What if the provider is reluctant to adopt XACML?“If the application won’t go to XACML then XACML will go to the application”

Eve Maler, Forrester

You still getCentrally managed authorizationStandards-based (XACML)

ApproachConvert from XACML to expected SaaS formatPush via SaaS management APIs

Option #3 – Policy Provisioning based on XACML

Page 24: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

24

SaaS provider

Option #3 – Architecture

Central IT:Company A

Convert XACML policies to the native format expected by the SaaS provider

Customer A users use the SaaS application

App#1

App#2

App#3

Func

tiona

l API

Native API

Authorization constraints / permissions in the format expected by the SaaS provider

Page 25: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

25

ProsFeasible todayViable solutionExtends the customer’s XACML-based authorization system’s reach

ConsPossible loss of XACML richness in access controlLoss of dynamic nature

Option #3 – Pros & Cons

Page 26: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

26

Standards are important for the cloudIt promotes vendor interoperabilityIt promotes layer interoperability

ExampleXACML authorization services can easily use SAML< OAUTH, OAUTH2, OpenID…XACML can also use semantic web standards

This leads to easier deployments and faster ROI

Standards & the Cloud

Page 27: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

27

Cloud requires eXtensible AuthorizationFine-grainedExternalized

Traditional approaches#1: tell your SaaS provider to adopt XACML.#2: proxy your cloud connections.

Extended approach#3: Policy Provisioning based on XACMLAlso works for business apps (SharePoint, Windows)

To summarize

Every cloud has a XACML lining

Page 28: OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is Being Done? Is it Enough?

28

OASIS technical committee:http://www.oasis-open.org/committees/xacml/

LinkedIn grouphttp://www.linkedin.com/groups/OASIS-XACML-3934718

Online resources