Identity and Access Management in the Cloud
Total Page:16
File Type:pdf, Size:1020Kb
White Paper www.novell.com Identity and Access Management in the Cloud Cloud Security Alliance Research Paper Sponsored by Novell Foreward At a time when companies are looking for ways to cut costs, cloud computing looks like an attractive alternative, one which you would think most cash-strapped IT departments would take a long look at. But a recent survey of mostly IT professionals conducted by Novell finds a strong mistrust for cloud computing in the workplace, while at the same time, a surprisingly wide acceptance for personal use. The survey was conducted using members of Novell's Cool Solutions Community from July to September, 2009. 453 people responded, of which 81 percent identified themselves as IT professionals. The respondents were from a variety of geographic locations including the US, India, China, Australia, Canada, South Africa and western Europe. The company sizes varied from 25 or less to more than 5000, with 44.6 percent working for companies with more than 1000 employees. When asked to list the top 5 things they feared or mistrusted about cloud computing in the workplace, security came in on top, with 34.6 percent listing it as their top choice. This is not surprising as many other surveys have indicated the same mistrust and confusion among end-users of the cloud. So, what is the truth – is cloud more secure than the enterprise or is it totally insecure. The answer is probably somewhere in the middle. This paper is an in-depth look at the identity and access management issues in the cloud. It goes into the different aspects of managing identities such as provisioning, federation, compliance as well newly emerging models of having identities in the cloud. It looks at these issues from the enterprise perspective and lists what enterprises need to ask cloud providers before they move to the cloud. This research will also serve as the foundation for the Trusted Cloud Initiative that was launched by CSA and Novell in March 2010 to research and outline a certification criteria that all cloud providers can adhere to. This initiative takes a major step in providing transparency and a level of trust for end-customers who are concerned about security in the cloud. For more information on this initiative, please logon to http://www.trusted-cloud.com or http://www.cloudsecurityalliance.org/trustedcloud This paper is part of domain 12 research on: Identity and Access Management by the Cloud Security Alliance (CSA). The material in this document is a copyrighted work of the Cloud Security Alliance. The Cloud Security Alliance is a non-profit organization formed to promote the use of best practices for providing security assurance within cloud computing and provide education on the uses of cloud computing to help secure all other forms of computing. For more information on the Cloud Security Alliance, visit www.cloudsecurityalliance.org. p. 2 Domain 12: Guidance for Identity & Access Management V2.1 Prepared by the Cloud Security Alliance April 2010 Domain 12: Guidance for Identity & Access Management V2.1 Introduction The permanent and official location for this Cloud Security Alliance Domain 12 Guidance for Identity & Access Management research is: http://www.cloudsecurityalliance.org/guidance/csaguide-dom12.pdf This research is a component of the Trusted Cloud Initiative, sponsored by Novell, Inc. © 2010 Cloud Security Alliance. All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud Security Alliance “Domain 12 Guidance for Identity & Access Management” at http://www.cloudsecurityalliance.org/guidance/csaguide-dom12- v2.10.pdf subject to the following: (a) the Guidance may be used solely for your personal, informational, non-commercial use; (b) the Guidance may not be modified or altered in any way; (c) the Guidance may not be redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote portions of the Guidance as permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions to the Cloud Security Alliance Domain 12 Guidance for Identity & Access Management research Version 2.1 (2010). Copyright © 2010 Cloud Security Alliance 2 Domain 12: Guidance for Identity & Access Management V2.1 Identity and Access Management Contributors: Subra Kumaraswamy, Sitaraman Lakshminarayanan, Michael Reiter, Joseph Stein, Yvonne Wilson INTRODUCTION ............................................................................................................6 IDENTITY PROVISIONING ..............................................................................................7 Identity Provisioning: Requirements...............................................................................................................7 Software as a Service ............................................................................................................................................................. 7 Platform as a Service.............................................................................................................................................................. 8 Infrastructure as a Service .................................................................................................................................................. 9 Identity Provisioning: Challenges .....................................................................................................................9 Software as a Service ............................................................................................................................................................. 9 Platform as a Service............................................................................................................................................................10 Infrastructure as a Service ................................................................................................................................................10 Identity Provisioning: Solutions and Recommendations ....................................................................... 10 Software as a Service/Platform as a Service .............................................................................................................11 Infrastructure as a Service ................................................................................................................................................11 Identity Provisioning: Questions for Your Provider and Assessment Checklist............................. 11 Software as a Service / Platform as a Service...........................................................................................................11 Infrastructure as a Service ................................................................................................................................................12 Identity Provisioning: Future Outlook ......................................................................................................... 12 Software as a Service / Platform as a Service...........................................................................................................12 Infrastructure as a Service ................................................................................................................................................12 AUTHENTICATION.......................................................................................................13 Authentication: Requirements and Challenges......................................................................................... 13 Authentication: Solutions and Recommendations................................................................................... 14 SaaS and PaaS..........................................................................................................................................................................14 IaaS...............................................................................................................................................................................................15 Private IaaS Clouds ...............................................................................................................................................................16 Strong Authentication .........................................................................................................................................................16 FEDERATION ...............................................................................................................16 Single SignOn...................................................................................................................................................... 17 Multiple Federation Standards........................................................................................................................................17 SAML for Web SSO ................................................................................................................................................................18 Identity Provider: Support for multiple standards ................................................................................................18 Copyright © 2010 Cloud Security Alliance 3 Domain 12: Guidance for Identity & Access Management V2.1 Federation Gateways ...........................................................................................................................................................18