SlideShare uma empresa Scribd logo
1 de 37
Compliance and Governance
Through Complex Entitlement
Management

Geoff Charron, VP ALES

Noam Bunder, Lead Architect
DataScan Technologies
Agenda Slide

 Entitlements in the Context of a SOA
 AquaLogic Enterprise Security (ALES) Overview


 Implementing Entitlements at DataScan




                         © 2006 BEA Systems, Inc. | 2
Business Drivers
Application Security has evolved
  Firewalls “keep the bad guys out” at the
   perimeter
  Web server security and Web SSO products
   provide basic access control at the Web tier
                                                                            Customers        Partners
  Application security logic still hard-wired and
   embedded in the application behind the Web
   tier

Industry trends are driving the
need to externalize entitlements                                             Employees     Contractors

from the application
  Multiple homegrown and embedded
   entitlements services
  Increasing regulatory pressure and privacy
   concerns                                                        Web          App      Enterprise       Data
                                                                  Servers      Servers     Apps          Stores
  Proliferation of applications and increasing
   disparate development teams
  Increasing competitive and time to market
   pressures


                                   © 2006 BEA Systems, Inc. | 3
What are Entitlements?
                                                      Entitlements Questions
                                                       Who can transfer funds?
                                                       How much can they transfer?
                                                       How often can they transfer?
                                                       Can they delegate those
                                                       rights?



 Entitlements are the set of privileges that govern what
 an application user can do
 Entitlements systems manage those privileges, the
 decision process and record the results


                       © 2006 BEA Systems, Inc. | 4
Key Challenge: Embedded Decisions

                                                                  Legacy
                                                                   App


                                                                   Data-
                                                                   base
                If (Transfer <TransLimit)
                    and (User can Transfer)
                then                                                User
                                                                  Directory
                   Allow Access
                else
                   Deny Access
                endif




• Security is embedded in applications – creates silos
• Applications are becoming more complex and may be developed
  by multiple team (including offshore)
• Developers spend time coding security logic
• Inconsistent policies and lack of central management
• Access decision may not be audited
                                   © 2006 BEA Systems, Inc. | 5
Key Challenge: Multiple Security Technologies
                                                                    Main-
                                                                   frames
                             J2EE App                 Web
                  Web                               Services
   Browser        App                                               Data-
                                                      Web           base
                                                    Services
                                                                   Identity/
                                                                    Policy
                  Web
                  App                                              Identity/
                                                                    Policy

                             Web SSO                 User
                                                   Directory        Legacy
                                                                     App


                                                       User          User
                                                    Provisioning    Profile




 • Multiple User directories, authentication services, Web SSO services,
   IAM products
 • How to rapidly and cost effectively deploy new applications that leverage
   existing infrastructure?


                                  © 2006 BEA Systems, Inc. | 6
Agenda Slide

 Entitlements in the Context of a SOA
 AquaLogic Enterprise Security (ALES) Overview


 Implementing Entitlements at DataScan




                         © 2006 BEA Systems, Inc. | 7
BEA AquaLogic in Your IT Enterprise


                           Portal                                                                   Dashboard
                                         Exceptions/Alerts         Monitoring          Reports



    User Interaction     Interaction                                Content
                                             AquaLogic User Interaction




                                                                                                                AquaLogic Enterprise Security
                                        Collaboration  Search                                     Analytics
                        Management                                Management

            Business
              Service
          Interaction    Process               AquaLogic BPM                     Suite
                                          Process     Process                        Process       Process
                        Modeling &
                                         Automation  Monitoring                      Analysis    Optimization
                        Simulation

          Messaging                                                 Operational
                           Service              AquaLogic Service Bus                              Service
                                            Routing  Transformation   Service
                         Integration          AquaLogic Service Registry
                                                                    Management
                                                                                                   Registry

         Shared Data
        and Business
            Services

         Data Access
                                             AquaLogic Data Services Platform
                                                    Data Access Layer


Security Services and
 Fine-Grained Access
              Control
            Back End
   Systems and Data
                                       Legacy                ERP           CRM         Custom
                                                  © 2006 BEA Systems, Inc. | 8
What is AquaLogic Enterprise Security?
                                                                                                       Browser
    Client
                                       Central PDP                              PAP

   •Java API
                                      Entitlements                          Admin Server
   •Web Service
                                         Server
                       •Web Service                                             SSM
                                           SSM
Distributed PDP        •XACML 2.0


    App                                                                      •WLS
                                                 PIP
   Server                                                                    •Tomcat
                                                                                                      XACML 2.0
                                       Entitlements
                                                                                           Policies     Policy
     SSM



  PEP’s For
                  ALES is an Entitlements system that enables the centralized
  •WLS
  •WLP            definition of complex application security policy and the
  •ALDSP          runtime enforcement of that policy.
  •ALSB
  •Java SDK       ALES consists of:
                      An Administrative Application (PAP)
                      A Policy Decision Point (PDP) that can be centralized or distributed
                      A Distributed PDP (SSM) is a Policy Enforcement Point (PEP)
                  The Administration Application is used to centrally manage
                  security configuration and policy
                                             © 2006 BEA Systems, Inc. | 9
Connecting Entitlements to the Application




public Forward processTransfer(TransferBean transferBean) throws Exception
{
       AuthenticIdentity ai = getAuthenticIdentityFromRequest(req);
       RuntimeAction ra = new RuntimeAction(ACTION.TRANSFER, "SIMPLE_ACTION");
       AppContextElement q3 = new SimpleContextElement("amount",transferBean.getAmount());
       AppContextElement collectorElement =
                     SimpleResponseContextCollector.makeContextElement();
       AccessResult ar = az.isAccessAllowed(ai,rr,ra,appCtx);
       if (ar.isAllowed()) {
           executeTransfer(transferBean);
....
}
       Note that code can easily be encapsulated

                                                                 © 2006 BEA Systems, Inc. | 10
Key ALES Benefits

                          • Change Entitlements without modifying
                            the application
Better Business Agility
                          • Implement changing regulatory and
                            corporate policies faster


                          • Finer control over the protection of
Enhanced Security and
                            application resources
Compliance
                          • Enhanced audit tracking


                          • Remove security logic from the
                            application
Increased IT Efficiency
                          • Free developers up to focus on value-
                            added business logic


                           © 2006 BEA Systems, Inc. | 11
1             DataScan Company Overview

                 2             Compliance Requirements at DataScan

                 3             DataScan BEA Implementation

                 4             Development Operational Lifecycle

                 5             Best Practices

                 6             Questions & Answers



                                                                     12
DataScan Technologies LLC – All Rights Reserved
About DataScan Technologies
                                                               DataScan Technologies
       DataScan Technologies is a global                       Corporate Headquarters

       leader in wholesale floorplan
       accounting and risk management
       systems and services.


        Founded in 1989
        Located in Alpharetta, Georgia
        Over 45 of the most prominent
         banks and captives
        Operating in 15 countries
        Currently manages over $45
         billion in outstanding collateral


                                                                                        13
DataScan Technologies LLC – All Rights Reserved
Partial Client List
            BMW Financial                           Comerica Bank
            World Omni Financial Corp.              SunTrust Bank
            California Federal Bank                 National City Bank
            Hibernia National Bank                  US Bank
            GE Capital                              Toro Credit Corp
            Yale/Hyster                             PACCAR
            Bank One                                Manheim (MAFS)
            Citizens Bank                           ScotiaBank
            JP Morgan Chase Bank                    CitiCapital
            Key Bank                                CIT Group
            M & T Bank                              Toyota Financial Services
            PNC Bank                                Hyundai Motor Finance
            Wachovia                                Mitsubishi Motors Credit
            Regions Bank                            Banknorth
            Provident Bank
            BB&T
            Zions Bank
            Huntington Bank
            VW Credit, Inc.
            Nissan/Renault-Mexico
            New South Federal                                                    14
DataScan Technologies LLC – All Rights Reserved
Wholesale Management System

                                  Wholesale Management System (WMS)
                                  A wholesale finance and accounting system
                                  built specifically for the wholesale floorplan
                                  industry.

                                  Dealer Access System (DAS)
                                  Allows dealerships to have Internet access
                                  to key information in the system.

                                  Collateral Management System (CMS)
                                  An automated floorplan data collection and
                                  risk management system utilizing touch
                                  screen technology.
                                  Nationwide Audit Services (NAS)
                                  A turnkey audit inspection service featuring
                                  a professional staff utilizing CMS.
                                                                                   15
DataScan Technologies LLC – All Rights Reserved
Risk Management
                                                                 Step 1




      Step 5                                                                                   Step 2
 Risk Managers                                                                              Auditor and Kit




                                                  Step 4




                                                                 Step 3
                                                  Workflow Engine and E-mail Notification
                                                                                                     16
DataScan Technologies LLC – All Rights Reserved
1             DataScan Company Overview

                 2             Compliance Requirements at DataScan

                 3             DataScan BEA Implementation

                 4             Development Operational Lifecycle

                 5             Best Practices

                 6             Questions & Answers



                                                                     17
DataScan Technologies LLC – All Rights Reserved
Business Drivers

        Mission critical application for banking and automotive
         industry managing over $45 billion in assets
               • Time to market
               • Buy vs. Build
               • Time/resources required for implementation and policy
                 changes << Key
               • Performance impact
               • Security compliance
                       SAS70 Type 2
                       GLBA/SoX
                       BITS/CC-MSR
                       ISO 27001
                       BRMMI/PriSM
                                                                         18
DataScan Technologies LLC – All Rights Reserved
Challenges

        Require a new Security Platform for replacement of legacy-
         based ASP financial services system with global existing
         install base
        Legacy system has embedded, customer-specific security
         logic
        High maintenance required for security policy changes
        Annual corporate audits (internal, SAS70 Type 2)
        Bi-annual customer security open-house
        Unscheduled customer ethical hacks
        Rapidly evolving financial industry security requirements
         (BITS, ISO 27001)



                                                                     19
DataScan Technologies LLC – All Rights Reserved
Compliance Overview

        Sarbanes Oxley Regulations
          • Requires internal controls or rules in place to ensure
            integrity of financial information
          • Section 404 – Internal controls
        Graham Leech Biley Act (GLBA)
          • SEC 501 is centered around the admin., physical, and
            technical safeguards over non-public customer
            information
        BITS
          • Common Criteria Master Security Requirements
          • Security for the security system
        ISO 27001
          • IT Systems Management and Governance
        BRMMI/PrISM
          • Upcoming Business Resiliency Maturity Model
          • Over 750 practices merging
            COBIT, BS7799/ISO17799, ITIL, ISF, NIST 800
            series, SEI BOK, DRII
                                                                     20
DataScan Technologies LLC – All Rights Reserved
Compliance-Based Design

        Prioritize design around “required” BITS topics
        Consolidate past ethical hacks and audits
        Time boxed delivery, focus on good design
        Balance delivery priorities with risk analysis
        Security Compliance Road Map
               • Policies
               • Processes
               • Controls
               • Audits/Monitoring




                                                                      21
DataScan Technologies LLC – All Rights Reserved
ALES Compliance Mapping

        Compliance based
         requirements and
         design
        Transparent security
         implementation
        Standards support
               • SAML
               • XACML




                                                                      22
DataScan Technologies LLC – All Rights Reserved
1             DataScan Company Overview

                 2             Compliance Requirements at DataScan

                 3             DataScan BEA Implementation

                 4             Development Operational Lifecycle

                 5             Best Practices

                 6             Questions & Answers



                                                                     23
DataScan Technologies LLC – All Rights Reserved
SOA Based Implementation




                                                                       24
DataScan Technologies LLC – All Rights Reserved
ALES Implementation

        Architecture Overview
               • Plain Java, Leverage BEA




                                                                  25
DataScan Technologies LLC – All Rights Reserved
ALES Deployment

        Operational Overview




       1.     Cluster
       2.     JVM
       3.     Managed Server
       4.     Sessions
       5.     ALES SSM
       6.     Connection Pools
       7.     EAR Deployment
       8.     Security Policy Administration
       9.     Portal Desktop Administration
                                                              26
DataScan Technologies LLC – All Rights Reserved
1             DataScan Company Overview

                 2             Compliance Requirements at DataScan

                 3             DataScan BEA Implementation

                 4             Development Operational Lifecycle

                 5             Best Practices

                 6             Questions & Answers



                                                                     27
DataScan Technologies LLC – All Rights Reserved
Development Team Composition

        BEA Professional Services
               • Initial Proof of Concept
               • Assistance with design
               • Working construction road map
        Development Team
               • Back End and Front End teams
               • Security team
               • Continuous builds to QA
               • Authentication only
               • Portal based security



                                                                  28
DataScan Technologies LLC – All Rights Reserved
Operational Lifecycle

        Security Development Team
               • Specialized, with contractors
        IT Administration
               • Security administrators (2-3)
               • Dedicated with back-up
        Documentation and Checklists
               • Packaged deployment




                                                                   29
DataScan Technologies LLC – All Rights Reserved
Operational Environments

        Distinct Environments
               • Development, QA Smoke Testing and Functional Testing
                 “Live”, Customer Beta/UAT, Support, Production and
                 Disaster Recovery
        Utilizing Virtualization
        Growth and Performance
               • Current production list includes four major financial
                 institutions
               • Rolling out to all customers over the next two years
               • Utilizing virtualization
                       2 x 4-way Dual Core 64 bit RedHat Linux AS 4.0, 32Gb
                        RAM, XEN environments
                       800+ users daily CPU load not exceeding 3%
                       Risk Managers, Bank Users, Dealerships                 30
DataScan Technologies LLC – All Rights Reserved
1             DataScan Company Overview

                 2             Compliance Requirements at DataScan

                 3             DataScan BEA Implementation

                 4             Development Operational Lifecycle

                 5             Best Practices

                 6             Questions & Answers



                                                                     31
DataScan Technologies LLC – All Rights Reserved
Why BEA?

        BEA Selection Criteria
               • Track record and solution completeness
               • Product suitability
                       Architecture
                       Road Map
               • Support
        Key Factors
               • Provides an elegant means to extract Security Logic
                 from the application
               • Disconnected design provides high performance and
                 resiliency
               • Provides flexible configuration with minimal maintenance
                 and operational resiliency
                                                                       32
DataScan Technologies LLC – All Rights Reserved
Kick Off

        Step by Step – Key Success Factors
               • Proposed Project
                       Project plan called for a three month implementation for
                        pilot target
               • Gain Sponsorship
                       Demonstrate value: Prototype and POC
                       Leverage existing platform
               • Establish Goals and Value Proposition
                       Capitalize on performance
                       Create gurus: Early mastery and battle scars




                                                                                   33
DataScan Technologies LLC – All Rights Reserved
Best Practices

        Partner with BEA Professional Services, leverage BEA
         Support (Hotline, Website) and BEA Educational
         Services classes
        Train IT first! System administration is key
        Build a workable environment (workstation/server)
        Integrate prototypes into plan
        Focus on what works, take risks where they are
         manageable
        Integrate BEA with other departments early
         (IT, Support, etc.)



                                                                34
DataScan Technologies LLC – All Rights Reserved
Looking Forward

        Customer and Regulation Driven
               • SAML Implementation
               • Refinement of standards and compliance
               • Full security-visibility throughout architectural stack




                                                                           35
DataScan Technologies LLC – All Rights Reserved
1             DataScan Company Overview

                 2             Compliance Requirements at DataScan

                 3             DataScan BEA Implementation

                 4             Development Operational Lifecycle

                 5             Best Practices

                 6             Questions & Answers



                                                                     36
DataScan Technologies LLC – All Rights Reserved
Thank You!

Questions?

Mais conteúdo relacionado

Mais procurados

Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Soa con8642 pdf_8642_0001
Soa con8642 pdf_8642_0001Soa con8642 pdf_8642_0001
Soa con8642 pdf_8642_0001jucaab
 
Soa cloud con8968_pdf_8968_0001
Soa cloud con8968_pdf_8968_0001Soa cloud con8968_pdf_8968_0001
Soa cloud con8968_pdf_8968_0001jucaab
 
Sun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-finalSun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-finalSal Marcus
 
VMware Zimbra 7
VMware Zimbra 7VMware Zimbra 7
VMware Zimbra 7Mike K
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplifiedvraopolisetti
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Michael Noel
 
Sim-webcast-part1-1aa
Sim-webcast-part1-1aaSim-webcast-part1-1aa
Sim-webcast-part1-1aaOracleIDM
 
TechEd Preconference
TechEd PreconferenceTechEd Preconference
TechEd PreconferenceSimon Guest
 
Identity Services Drilldown - TechEd NA 2009
Identity Services Drilldown - TechEd NA 2009Identity Services Drilldown - TechEd NA 2009
Identity Services Drilldown - TechEd NA 2009Jorgen Thelin
 
CA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiCA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiVasu Surabhi
 
SPEC INDIA Java Case Study
SPEC INDIA Java Case StudySPEC INDIA Java Case Study
SPEC INDIA Java Case StudySPEC INDIA
 
Codestrong 2012 breakout session the role of cloud services in your next ge...
Codestrong 2012 breakout session   the role of cloud services in your next ge...Codestrong 2012 breakout session   the role of cloud services in your next ge...
Codestrong 2012 breakout session the role of cloud services in your next ge...Axway Appcelerator
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1bSOA Symposium
 
A great api is hard to find
A great api is hard to findA great api is hard to find
A great api is hard to findDan Diephouse
 
Heavy Metal PowerPivot Remastered SPTechCon
Heavy Metal PowerPivot Remastered SPTechConHeavy Metal PowerPivot Remastered SPTechCon
Heavy Metal PowerPivot Remastered SPTechConSentri
 

Mais procurados (20)

Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Soa con8642 pdf_8642_0001
Soa con8642 pdf_8642_0001Soa con8642 pdf_8642_0001
Soa con8642 pdf_8642_0001
 
Unwired Platform
Unwired PlatformUnwired Platform
Unwired Platform
 
Soa cloud con8968_pdf_8968_0001
Soa cloud con8968_pdf_8968_0001Soa cloud con8968_pdf_8968_0001
Soa cloud con8968_pdf_8968_0001
 
Sun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-finalSun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-final
 
VMware Zimbra 7
VMware Zimbra 7VMware Zimbra 7
VMware Zimbra 7
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
 
Sim-webcast-part1-1aa
Sim-webcast-part1-1aaSim-webcast-part1-1aa
Sim-webcast-part1-1aa
 
TechEd Preconference
TechEd PreconferenceTechEd Preconference
TechEd Preconference
 
Identity Services Drilldown - TechEd NA 2009
Identity Services Drilldown - TechEd NA 2009Identity Services Drilldown - TechEd NA 2009
Identity Services Drilldown - TechEd NA 2009
 
Oracle Identity Manager Basics
Oracle Identity Manager BasicsOracle Identity Manager Basics
Oracle Identity Manager Basics
 
CA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiCA CloudMinder Vasu Surabhi
CA CloudMinder Vasu Surabhi
 
SPEC INDIA Java Case Study
SPEC INDIA Java Case StudySPEC INDIA Java Case Study
SPEC INDIA Java Case Study
 
Donny - EAI
Donny - EAIDonny - EAI
Donny - EAI
 
Oim Poc1.0
Oim Poc1.0Oim Poc1.0
Oim Poc1.0
 
Codestrong 2012 breakout session the role of cloud services in your next ge...
Codestrong 2012 breakout session   the role of cloud services in your next ge...Codestrong 2012 breakout session   the role of cloud services in your next ge...
Codestrong 2012 breakout session the role of cloud services in your next ge...
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1b
 
A great api is hard to find
A great api is hard to findA great api is hard to find
A great api is hard to find
 
Heavy Metal PowerPivot Remastered SPTechCon
Heavy Metal PowerPivot Remastered SPTechConHeavy Metal PowerPivot Remastered SPTechCon
Heavy Metal PowerPivot Remastered SPTechCon
 

Semelhante a Compliance and Governance Through Complex Entitlement Management

Building and Managing Cloud Applications and Infrastructure
Building and Managing Cloud Applications and InfrastructureBuilding and Managing Cloud Applications and Infrastructure
Building and Managing Cloud Applications and InfrastructureDarren Cunningham
 
02 Ms Online Identity Session 1
02 Ms Online Identity   Session 102 Ms Online Identity   Session 1
02 Ms Online Identity Session 1Sivadon Chaisiri
 
Oracle SOA Suite Overview - Integration in a Service-Oriented World
Oracle SOA Suite Overview - Integration in a Service-Oriented WorldOracle SOA Suite Overview - Integration in a Service-Oriented World
Oracle SOA Suite Overview - Integration in a Service-Oriented WorldOracleContractors
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or LessCloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or LessSalesforce_APAC
 
Vincent Desveronnieres, Oracle
Vincent Desveronnieres,  OracleVincent Desveronnieres,  Oracle
Vincent Desveronnieres, OracleEwa Stepien
 
Compuware APM Solution
Compuware APM SolutionCompuware APM Solution
Compuware APM Solutionbackfire_88
 
Jazz for Service Management - OMNIbus
Jazz for Service Management - OMNIbusJazz for Service Management - OMNIbus
Jazz for Service Management - OMNIbusIBM_BSM
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
 
Concepts integrationandbiztalksoa andbpm
Concepts integrationandbiztalksoa andbpm Concepts integrationandbiztalksoa andbpm
Concepts integrationandbiztalksoa andbpm Sandro Pereira
 
Timelytrendsin appdelivery
Timelytrendsin appdeliveryTimelytrendsin appdelivery
Timelytrendsin appdeliveryKelly Emo
 
Layer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOALayer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOACA API Management
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerOracleIDM
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 

Semelhante a Compliance and Governance Through Complex Entitlement Management (20)

Building and Managing Cloud Applications and Infrastructure
Building and Managing Cloud Applications and InfrastructureBuilding and Managing Cloud Applications and Infrastructure
Building and Managing Cloud Applications and Infrastructure
 
02 Ms Online Identity Session 1
02 Ms Online Identity   Session 102 Ms Online Identity   Session 1
02 Ms Online Identity Session 1
 
Oracle SOA Suite Overview - Integration in a Service-Oriented World
Oracle SOA Suite Overview - Integration in a Service-Oriented WorldOracle SOA Suite Overview - Integration in a Service-Oriented World
Oracle SOA Suite Overview - Integration in a Service-Oriented World
 
IT Governance Portals
IT Governance   PortalsIT Governance   Portals
IT Governance Portals
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or LessCloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or Less
 
Vincent Desveronnieres, Oracle
Vincent Desveronnieres,  OracleVincent Desveronnieres,  Oracle
Vincent Desveronnieres, Oracle
 
Compuware APM Solution
Compuware APM SolutionCompuware APM Solution
Compuware APM Solution
 
Jazz for Service Management - OMNIbus
Jazz for Service Management - OMNIbusJazz for Service Management - OMNIbus
Jazz for Service Management - OMNIbus
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
 
Concepts integrationandbiztalksoa andbpm
Concepts integrationandbiztalksoa andbpm Concepts integrationandbiztalksoa andbpm
Concepts integrationandbiztalksoa andbpm
 
Timelytrendsin appdelivery
Timelytrendsin appdeliveryTimelytrendsin appdelivery
Timelytrendsin appdelivery
 
Cloud Auditing
Cloud AuditingCloud Auditing
Cloud Auditing
 
Layer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOALayer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOA
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements Server
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 

Compliance and Governance Through Complex Entitlement Management

  • 1. Compliance and Governance Through Complex Entitlement Management Geoff Charron, VP ALES Noam Bunder, Lead Architect DataScan Technologies
  • 2. Agenda Slide Entitlements in the Context of a SOA AquaLogic Enterprise Security (ALES) Overview Implementing Entitlements at DataScan © 2006 BEA Systems, Inc. | 2
  • 3. Business Drivers Application Security has evolved  Firewalls “keep the bad guys out” at the perimeter  Web server security and Web SSO products provide basic access control at the Web tier Customers Partners  Application security logic still hard-wired and embedded in the application behind the Web tier Industry trends are driving the need to externalize entitlements Employees Contractors from the application  Multiple homegrown and embedded entitlements services  Increasing regulatory pressure and privacy concerns Web App Enterprise Data Servers Servers Apps Stores  Proliferation of applications and increasing disparate development teams  Increasing competitive and time to market pressures © 2006 BEA Systems, Inc. | 3
  • 4. What are Entitlements? Entitlements Questions Who can transfer funds? How much can they transfer? How often can they transfer? Can they delegate those rights? Entitlements are the set of privileges that govern what an application user can do Entitlements systems manage those privileges, the decision process and record the results © 2006 BEA Systems, Inc. | 4
  • 5. Key Challenge: Embedded Decisions Legacy App Data- base If (Transfer <TransLimit) and (User can Transfer) then User Directory Allow Access else Deny Access endif • Security is embedded in applications – creates silos • Applications are becoming more complex and may be developed by multiple team (including offshore) • Developers spend time coding security logic • Inconsistent policies and lack of central management • Access decision may not be audited © 2006 BEA Systems, Inc. | 5
  • 6. Key Challenge: Multiple Security Technologies Main- frames J2EE App Web Web Services Browser App Data- Web base Services Identity/ Policy Web App Identity/ Policy Web SSO User Directory Legacy App User User Provisioning Profile • Multiple User directories, authentication services, Web SSO services, IAM products • How to rapidly and cost effectively deploy new applications that leverage existing infrastructure? © 2006 BEA Systems, Inc. | 6
  • 7. Agenda Slide Entitlements in the Context of a SOA AquaLogic Enterprise Security (ALES) Overview Implementing Entitlements at DataScan © 2006 BEA Systems, Inc. | 7
  • 8. BEA AquaLogic in Your IT Enterprise Portal Dashboard Exceptions/Alerts Monitoring Reports User Interaction Interaction Content AquaLogic User Interaction AquaLogic Enterprise Security Collaboration Search Analytics Management Management Business Service Interaction Process AquaLogic BPM Suite Process Process Process Process Modeling & Automation Monitoring Analysis Optimization Simulation Messaging Operational Service AquaLogic Service Bus Service Routing Transformation Service Integration AquaLogic Service Registry Management Registry Shared Data and Business Services Data Access AquaLogic Data Services Platform Data Access Layer Security Services and Fine-Grained Access Control Back End Systems and Data Legacy ERP CRM Custom © 2006 BEA Systems, Inc. | 8
  • 9. What is AquaLogic Enterprise Security? Browser Client Central PDP PAP •Java API Entitlements Admin Server •Web Service Server •Web Service SSM SSM Distributed PDP •XACML 2.0 App •WLS PIP Server •Tomcat XACML 2.0 Entitlements Policies Policy SSM PEP’s For ALES is an Entitlements system that enables the centralized •WLS •WLP definition of complex application security policy and the •ALDSP runtime enforcement of that policy. •ALSB •Java SDK ALES consists of:  An Administrative Application (PAP)  A Policy Decision Point (PDP) that can be centralized or distributed  A Distributed PDP (SSM) is a Policy Enforcement Point (PEP) The Administration Application is used to centrally manage security configuration and policy © 2006 BEA Systems, Inc. | 9
  • 10. Connecting Entitlements to the Application public Forward processTransfer(TransferBean transferBean) throws Exception { AuthenticIdentity ai = getAuthenticIdentityFromRequest(req); RuntimeAction ra = new RuntimeAction(ACTION.TRANSFER, "SIMPLE_ACTION"); AppContextElement q3 = new SimpleContextElement("amount",transferBean.getAmount()); AppContextElement collectorElement = SimpleResponseContextCollector.makeContextElement(); AccessResult ar = az.isAccessAllowed(ai,rr,ra,appCtx); if (ar.isAllowed()) { executeTransfer(transferBean); .... } Note that code can easily be encapsulated © 2006 BEA Systems, Inc. | 10
  • 11. Key ALES Benefits • Change Entitlements without modifying the application Better Business Agility • Implement changing regulatory and corporate policies faster • Finer control over the protection of Enhanced Security and application resources Compliance • Enhanced audit tracking • Remove security logic from the application Increased IT Efficiency • Free developers up to focus on value- added business logic © 2006 BEA Systems, Inc. | 11
  • 12. 1 DataScan Company Overview 2 Compliance Requirements at DataScan 3 DataScan BEA Implementation 4 Development Operational Lifecycle 5 Best Practices 6 Questions & Answers 12 DataScan Technologies LLC – All Rights Reserved
  • 13. About DataScan Technologies DataScan Technologies DataScan Technologies is a global Corporate Headquarters leader in wholesale floorplan accounting and risk management systems and services.  Founded in 1989  Located in Alpharetta, Georgia  Over 45 of the most prominent banks and captives  Operating in 15 countries  Currently manages over $45 billion in outstanding collateral 13 DataScan Technologies LLC – All Rights Reserved
  • 14. Partial Client List  BMW Financial  Comerica Bank  World Omni Financial Corp.  SunTrust Bank  California Federal Bank  National City Bank  Hibernia National Bank  US Bank  GE Capital  Toro Credit Corp  Yale/Hyster  PACCAR  Bank One  Manheim (MAFS)  Citizens Bank  ScotiaBank  JP Morgan Chase Bank  CitiCapital  Key Bank  CIT Group  M & T Bank  Toyota Financial Services  PNC Bank  Hyundai Motor Finance  Wachovia  Mitsubishi Motors Credit  Regions Bank  Banknorth  Provident Bank  BB&T  Zions Bank  Huntington Bank  VW Credit, Inc.  Nissan/Renault-Mexico  New South Federal 14 DataScan Technologies LLC – All Rights Reserved
  • 15. Wholesale Management System Wholesale Management System (WMS) A wholesale finance and accounting system built specifically for the wholesale floorplan industry. Dealer Access System (DAS) Allows dealerships to have Internet access to key information in the system. Collateral Management System (CMS) An automated floorplan data collection and risk management system utilizing touch screen technology. Nationwide Audit Services (NAS) A turnkey audit inspection service featuring a professional staff utilizing CMS. 15 DataScan Technologies LLC – All Rights Reserved
  • 16. Risk Management Step 1 Step 5 Step 2 Risk Managers Auditor and Kit Step 4 Step 3 Workflow Engine and E-mail Notification 16 DataScan Technologies LLC – All Rights Reserved
  • 17. 1 DataScan Company Overview 2 Compliance Requirements at DataScan 3 DataScan BEA Implementation 4 Development Operational Lifecycle 5 Best Practices 6 Questions & Answers 17 DataScan Technologies LLC – All Rights Reserved
  • 18. Business Drivers  Mission critical application for banking and automotive industry managing over $45 billion in assets • Time to market • Buy vs. Build • Time/resources required for implementation and policy changes << Key • Performance impact • Security compliance  SAS70 Type 2  GLBA/SoX  BITS/CC-MSR  ISO 27001  BRMMI/PriSM 18 DataScan Technologies LLC – All Rights Reserved
  • 19. Challenges  Require a new Security Platform for replacement of legacy- based ASP financial services system with global existing install base  Legacy system has embedded, customer-specific security logic  High maintenance required for security policy changes  Annual corporate audits (internal, SAS70 Type 2)  Bi-annual customer security open-house  Unscheduled customer ethical hacks  Rapidly evolving financial industry security requirements (BITS, ISO 27001) 19 DataScan Technologies LLC – All Rights Reserved
  • 20. Compliance Overview  Sarbanes Oxley Regulations • Requires internal controls or rules in place to ensure integrity of financial information • Section 404 – Internal controls  Graham Leech Biley Act (GLBA) • SEC 501 is centered around the admin., physical, and technical safeguards over non-public customer information  BITS • Common Criteria Master Security Requirements • Security for the security system  ISO 27001 • IT Systems Management and Governance  BRMMI/PrISM • Upcoming Business Resiliency Maturity Model • Over 750 practices merging COBIT, BS7799/ISO17799, ITIL, ISF, NIST 800 series, SEI BOK, DRII 20 DataScan Technologies LLC – All Rights Reserved
  • 21. Compliance-Based Design  Prioritize design around “required” BITS topics  Consolidate past ethical hacks and audits  Time boxed delivery, focus on good design  Balance delivery priorities with risk analysis  Security Compliance Road Map • Policies • Processes • Controls • Audits/Monitoring 21 DataScan Technologies LLC – All Rights Reserved
  • 22. ALES Compliance Mapping  Compliance based requirements and design  Transparent security implementation  Standards support • SAML • XACML 22 DataScan Technologies LLC – All Rights Reserved
  • 23. 1 DataScan Company Overview 2 Compliance Requirements at DataScan 3 DataScan BEA Implementation 4 Development Operational Lifecycle 5 Best Practices 6 Questions & Answers 23 DataScan Technologies LLC – All Rights Reserved
  • 24. SOA Based Implementation 24 DataScan Technologies LLC – All Rights Reserved
  • 25. ALES Implementation  Architecture Overview • Plain Java, Leverage BEA 25 DataScan Technologies LLC – All Rights Reserved
  • 26. ALES Deployment  Operational Overview 1. Cluster 2. JVM 3. Managed Server 4. Sessions 5. ALES SSM 6. Connection Pools 7. EAR Deployment 8. Security Policy Administration 9. Portal Desktop Administration 26 DataScan Technologies LLC – All Rights Reserved
  • 27. 1 DataScan Company Overview 2 Compliance Requirements at DataScan 3 DataScan BEA Implementation 4 Development Operational Lifecycle 5 Best Practices 6 Questions & Answers 27 DataScan Technologies LLC – All Rights Reserved
  • 28. Development Team Composition  BEA Professional Services • Initial Proof of Concept • Assistance with design • Working construction road map  Development Team • Back End and Front End teams • Security team • Continuous builds to QA • Authentication only • Portal based security 28 DataScan Technologies LLC – All Rights Reserved
  • 29. Operational Lifecycle  Security Development Team • Specialized, with contractors  IT Administration • Security administrators (2-3) • Dedicated with back-up  Documentation and Checklists • Packaged deployment 29 DataScan Technologies LLC – All Rights Reserved
  • 30. Operational Environments  Distinct Environments • Development, QA Smoke Testing and Functional Testing “Live”, Customer Beta/UAT, Support, Production and Disaster Recovery  Utilizing Virtualization  Growth and Performance • Current production list includes four major financial institutions • Rolling out to all customers over the next two years • Utilizing virtualization  2 x 4-way Dual Core 64 bit RedHat Linux AS 4.0, 32Gb RAM, XEN environments  800+ users daily CPU load not exceeding 3%  Risk Managers, Bank Users, Dealerships 30 DataScan Technologies LLC – All Rights Reserved
  • 31. 1 DataScan Company Overview 2 Compliance Requirements at DataScan 3 DataScan BEA Implementation 4 Development Operational Lifecycle 5 Best Practices 6 Questions & Answers 31 DataScan Technologies LLC – All Rights Reserved
  • 32. Why BEA?  BEA Selection Criteria • Track record and solution completeness • Product suitability  Architecture  Road Map • Support  Key Factors • Provides an elegant means to extract Security Logic from the application • Disconnected design provides high performance and resiliency • Provides flexible configuration with minimal maintenance and operational resiliency 32 DataScan Technologies LLC – All Rights Reserved
  • 33. Kick Off  Step by Step – Key Success Factors • Proposed Project  Project plan called for a three month implementation for pilot target • Gain Sponsorship  Demonstrate value: Prototype and POC  Leverage existing platform • Establish Goals and Value Proposition  Capitalize on performance  Create gurus: Early mastery and battle scars 33 DataScan Technologies LLC – All Rights Reserved
  • 34. Best Practices  Partner with BEA Professional Services, leverage BEA Support (Hotline, Website) and BEA Educational Services classes  Train IT first! System administration is key  Build a workable environment (workstation/server)  Integrate prototypes into plan  Focus on what works, take risks where they are manageable  Integrate BEA with other departments early (IT, Support, etc.) 34 DataScan Technologies LLC – All Rights Reserved
  • 35. Looking Forward  Customer and Regulation Driven • SAML Implementation • Refinement of standards and compliance • Full security-visibility throughout architectural stack 35 DataScan Technologies LLC – All Rights Reserved
  • 36. 1 DataScan Company Overview 2 Compliance Requirements at DataScan 3 DataScan BEA Implementation 4 Development Operational Lifecycle 5 Best Practices 6 Questions & Answers 36 DataScan Technologies LLC – All Rights Reserved