SlideShare a Scribd company logo
1 of 40
Navigating the Clouds with an
Enterprise IT Strategy
The importance of understanding risks in strategic innovations
Clayton Burton
Jason Long
Fred Miller
Agenda (and obligatory cloud picture)
 IT Strategic Planning and the Cloud
 The Role of Various Cloud Models
 Identity Management
 Shibboleth in Detail
 Lessons Learned
 Future considerations
About you?
 Interested more in security, strategy, or cloud apps?
 Have a strategic plan the addresses cloud services?
 Cloud Services for email/calendar?
 Other types of cloud services?
 Single sign-on solutions?
 Using Internet2 Net+ services?
 Have a strategy for cloud and BYOD?
About Furman University
• Private liberal arts university
• 750 acres campus in Greenville, South Carolina
• 2650 undergraduates
• 96% live on-campus
• Division 1 athletics
Furman’s IT Strategic Plans
 2007
 II.24.2 Establish an efficient central system that serves as the
information window to Furman University
 Implement Single Sign-On
 2011
 2. Champion scalable information technology innovations
and best practices.
 Enable efficient operations using appropriate vendor,
cloud, and open source solutions.
Consumers
Industry Govt. / Legal
Consortia
Higher Ed
Institution
Foundations
Affecting institutions’ strategy
Strategic
Operational
Consumerization
Digitization
(Information Architecture)
Innovation
Collaboration
Communication
Service
Investing in an IT project portfolio
Innovation within the IT Portfolio
• Strategic Innovations
• Infrastructure
• Analytics
• Transaction Processing
IncreasingRisk
Adapted from Ross and Weil, IT Savvy: What Top Executives Must Know to Go from Pain to Gain, Harvard Business Press, 2009, fig. 3-2.
Consumerization & cloud services
 IT as a partner, not competitor
 Technology contract approvals
 Compliance reviews
 Leadership agreement on a platform approach
 Post-implementation reviews
Vision: One place for all your Furman stuff...
Models of cloud services & risks
 Software As A Service: “Cloud As A Kit”
 Infrastructure As A Service: “Pay As You Go”
 Collaboration Opportunities
SaaS – “Cloud as a Kit”
 Over 40 Software-As-A-Service contracts
 Event scheduling
 PCI-DSS solutions
 Admission
 OrgSync
 More
 Office 365
 Box
 Risks?
IaaS - “Pay as You Go”
 Amazon, Moodle & Mobile
edge.furman.edu
Identity management
 Identity strategy: provisioning and de-provisioning
 The university portal: when is single sign-on appropriate
 Shibboleth and federated identity
 One place for "all your campus stuff"
 Risks? Costs?
One identity, infinite services
Motivations
 Consumerization-driven services expected
 Excellent usability: fewer passwords; fewer URLs
 Provisioning and removing user access easier
 3rd party services never see passwords
One password, infinite access
Risks
 Too much access: one password for (almost) everything
 Log out confusion possible
 Possible critical failure point
 Social engineering weakness
 Less direct control
SSO choices
 Interdependent, overlapping, standard-resistant choices
 Not just services you know you will have
 Complex decisions made quickly with limited information
Additional considerations
 Moving from managing systems to managing services
 TRUST
 Consultants vs. training
 Wide net vs. standardizing support
 Total cost of architecture
 Redundancy
 Staffing: anchoring the cloud
Our current SSO setup
Future SSO setup
Intermediate step
Furman’s choices
 SSO Easy for speed of deployment
 Fischer International consulted for Shibboleth installation
 Consolidation of architecture in phases
 Redundancy of key systems
 Moving to shibboleth standard and in-house support
Where do Shibboleths come from?
SAML
 Security Services Technical Committee (SSTC)
 3 versions:
 v1.0 in 2002
 v1.1 in 2003
 v2.0 in 2005 (most recent version as of Apr 2013)
SAML's building blocks
 SAML Core: the data that's transmitted
 assertions, requests, responses
 Bindings: how the data's transmitted
 ie: SOAP, HTTP POST, HTTP Redirect (GET)
 Profiles: describe use cases in detail
SAML 2.0 Profiles
 SSO Profiles
 Web Browser SSO Profile
 Enhanced Client or Proxy (ECP) Profile
 Identity Provider Discovery Profile
 Single Logout Profile
 Name Identifier Management Profile
 Artifact Resolution Profile
 Assertion Query/Request Profile
 Name Identifier Mapping Profile
 SAML Attribute Profiles
SAML Flowchart Phase 1
You request a resource
SAML Flowchart Phase 2
Login if you haven't already
Here's the login!
(the Single sign-on)
SAML Flowchart Phase 3
You get the resource
SAML Flowchart (complete)
from Oasis SAML v2 Technical Overview PDF
WAYF?
Where Are You From?
aka "Discovery"
How the SP knows which IdP
inherent in the URL,
ie: furman.SP.com
passed in the URL
ie: SP.com/furman
SAML 2.0 IdP Discovery Protocol
Just ask!
SAML Metadata
 usually maintained by your
Federation
 adds security
 SPs and IdPs specified
 certificates
 more maintainable
 configuration stored in
one place
 simplifies process of
adding SPs
Don't mind me! I'm just the Metadata!
Where's the Metadata?
 For InCommon:
 https://wayf.incommonfederation.org/InCommon/InCommon-
metadata.xml
 About 6 MB
 Take care to configure servers properly using HTTPS!
Additional Considerations
 Service Logout vs. Session Logout
 see SAML 2.0 Single Logout protocol and profile
 Shibboleth IdP Clustering
 Internet2 recommends Terracotta
 Stateless Clustering: requires customization
 Active-Passive redundant servers
Lessons learned
 Identify risks
 Educate the community
 Manage Change
 Leadership support key
 TRUST
Challenges & opportunities
 More Mobile
 Virtualization
 Data center in the cloud
 More collaborations
 When to partner?
Thanks

More Related Content

What's hot

Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Partner Productivity Overview - Exchange 2013
Partner Productivity Overview - Exchange 2013Partner Productivity Overview - Exchange 2013
Partner Productivity Overview - Exchange 2013Jennifer Stevenson
 
Spstc2011 Getting the Most from SharePoint's User Profiles
Spstc2011   Getting the Most from SharePoint's User ProfilesSpstc2011   Getting the Most from SharePoint's User Profiles
Spstc2011 Getting the Most from SharePoint's User ProfilesMichael Oryszak
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerHitachi ID Systems, Inc.
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Toolsijtsrd
 
Microsoft Exchange 2013 Introduction
Microsoft Exchange 2013 IntroductionMicrosoft Exchange 2013 Introduction
Microsoft Exchange 2013 IntroductionMotty Ben Atia
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesOneLogin
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Connector Framework
Connector FrameworkConnector Framework
Connector FrameworkEmpowerID
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASBAmmar Hasayen
 
AWS Identity Access Management
AWS Identity Access ManagementAWS Identity Access Management
AWS Identity Access ManagementRichard Harvey
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...CloudEntr
 
Web 2.0 Expo Presentation V4
Web 2.0 Expo Presentation V4Web 2.0 Expo Presentation V4
Web 2.0 Expo Presentation V4Ken Pulverman
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0Ganesh Prasad
 

What's hot (20)

IAM Tools
IAM ToolsIAM Tools
IAM Tools
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Partner Productivity Overview - Exchange 2013
Partner Productivity Overview - Exchange 2013Partner Productivity Overview - Exchange 2013
Partner Productivity Overview - Exchange 2013
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
Spstc2011 Getting the Most from SharePoint's User Profiles
Spstc2011   Getting the Most from SharePoint's User ProfilesSpstc2011   Getting the Most from SharePoint's User Profiles
Spstc2011 Getting the Most from SharePoint's User Profiles
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Tools
 
Microsoft Exchange 2013 Introduction
Microsoft Exchange 2013 IntroductionMicrosoft Exchange 2013 Introduction
Microsoft Exchange 2013 Introduction
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Connector Framework
Connector FrameworkConnector Framework
Connector Framework
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
 
AWS Identity Access Management
AWS Identity Access ManagementAWS Identity Access Management
AWS Identity Access Management
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
 
Web 2.0 Expo Presentation V4
Web 2.0 Expo Presentation V4Web 2.0 Expo Presentation V4
Web 2.0 Expo Presentation V4
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 

Viewers also liked

MOOCs, Money, and E-Learning Models
MOOCs, Money, and E-Learning ModelsMOOCs, Money, and E-Learning Models
MOOCs, Money, and E-Learning Modelsredmiller1
 
eMoney Advisor Summit 2015
eMoney Advisor Summit 2015 eMoney Advisor Summit 2015
eMoney Advisor Summit 2015 Matt Nesbitt
 
Real money meets e money
Real money meets e moneyReal money meets e money
Real money meets e moneyAITI-KACE
 
Finovate solutions 2015 v2.2
Finovate solutions 2015 v2.2Finovate solutions 2015 v2.2
Finovate solutions 2015 v2.2Yuriy Chayka
 
E money guide presentation
E money guide presentationE money guide presentation
E money guide presentationCamilo Tellez
 
The Evolution of e-Money (DeepSec)
The Evolution of e-Money (DeepSec)The Evolution of e-Money (DeepSec)
The Evolution of e-Money (DeepSec)Jon Matonis
 
The Evolution of E-Money
The Evolution of E-MoneyThe Evolution of E-Money
The Evolution of E-MoneyJon Matonis
 
Mobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanMobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanGerhard Fasol
 

Viewers also liked (12)

MOOCs, Money, and E-Learning Models
MOOCs, Money, and E-Learning ModelsMOOCs, Money, and E-Learning Models
MOOCs, Money, and E-Learning Models
 
eMoney Advisor Summit 2015
eMoney Advisor Summit 2015 eMoney Advisor Summit 2015
eMoney Advisor Summit 2015
 
Real money meets e money
Real money meets e moneyReal money meets e money
Real money meets e money
 
E money mds
E money mdsE money mds
E money mds
 
Finovate solutions 2015 v2.2
Finovate solutions 2015 v2.2Finovate solutions 2015 v2.2
Finovate solutions 2015 v2.2
 
E money guide presentation
E money guide presentationE money guide presentation
E money guide presentation
 
The Evolution of e-Money (DeepSec)
The Evolution of e-Money (DeepSec)The Evolution of e-Money (DeepSec)
The Evolution of e-Money (DeepSec)
 
E-money Payment System
E-money Payment SystemE-money Payment System
E-money Payment System
 
The Evolution of E-Money
The Evolution of E-MoneyThe Evolution of E-Money
The Evolution of E-Money
 
Mobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanMobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in Japan
 
Ecash ppt
Ecash pptEcash ppt
Ecash ppt
 
E-money
E-moneyE-money
E-money
 

Similar to Navigating Cloud Risks with an Enterprise IT Strategy

Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxmariona83
 
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the cloudsSharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the cloudsBIWUG
 
Spca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackieSpca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackieNCCOMMS
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huangKen Huang
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Club Alliances
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborationsjbasney
 
Canarie Federated Non Web Signon
Canarie Federated Non Web SignonCanarie Federated Non Web Signon
Canarie Federated Non Web SignonChris Phillips
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseEvan Hodges
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...EuroCloud
 
Campus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson UniversityCampus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson UniversityCampus Consortium
 
Value Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishValue Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishGuillaume Lagache
 

Similar to Navigating Cloud Risks with an Enterprise IT Strategy (20)

Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the cloudsSharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
 
Spca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackieSpca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackie
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 
Canarie Federated Non Web Signon
Canarie Federated Non Web SignonCanarie Federated Non Web Signon
Canarie Federated Non Web Signon
 
Architect day 20181128 - Afternoon Session
Architect day 20181128 - Afternoon SessionArchitect day 20181128 - Afternoon Session
Architect day 20181128 - Afternoon Session
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
Cloud computing in context
Cloud computing in contextCloud computing in context
Cloud computing in context
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
 
Web-services
Web-services Web-services
Web-services
 
Campus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson UniversityCampus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson University
 
Value Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishValue Microsoft 365 E5 English
Value Microsoft 365 E5 English
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 

Recently uploaded

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 

Recently uploaded (20)

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 

Navigating Cloud Risks with an Enterprise IT Strategy

  • 1. Navigating the Clouds with an Enterprise IT Strategy The importance of understanding risks in strategic innovations Clayton Burton Jason Long Fred Miller
  • 2. Agenda (and obligatory cloud picture)  IT Strategic Planning and the Cloud  The Role of Various Cloud Models  Identity Management  Shibboleth in Detail  Lessons Learned  Future considerations
  • 3. About you?  Interested more in security, strategy, or cloud apps?  Have a strategic plan the addresses cloud services?  Cloud Services for email/calendar?  Other types of cloud services?  Single sign-on solutions?  Using Internet2 Net+ services?  Have a strategy for cloud and BYOD?
  • 4. About Furman University • Private liberal arts university • 750 acres campus in Greenville, South Carolina • 2650 undergraduates • 96% live on-campus • Division 1 athletics
  • 5. Furman’s IT Strategic Plans  2007  II.24.2 Establish an efficient central system that serves as the information window to Furman University  Implement Single Sign-On  2011  2. Champion scalable information technology innovations and best practices.  Enable efficient operations using appropriate vendor, cloud, and open source solutions.
  • 6. Consumers Industry Govt. / Legal Consortia Higher Ed Institution Foundations
  • 8. Investing in an IT project portfolio
  • 9. Innovation within the IT Portfolio • Strategic Innovations • Infrastructure • Analytics • Transaction Processing IncreasingRisk Adapted from Ross and Weil, IT Savvy: What Top Executives Must Know to Go from Pain to Gain, Harvard Business Press, 2009, fig. 3-2.
  • 10. Consumerization & cloud services  IT as a partner, not competitor  Technology contract approvals  Compliance reviews  Leadership agreement on a platform approach  Post-implementation reviews
  • 11. Vision: One place for all your Furman stuff...
  • 12.
  • 13. Models of cloud services & risks  Software As A Service: “Cloud As A Kit”  Infrastructure As A Service: “Pay As You Go”  Collaboration Opportunities
  • 14. SaaS – “Cloud as a Kit”  Over 40 Software-As-A-Service contracts  Event scheduling  PCI-DSS solutions  Admission  OrgSync  More  Office 365  Box  Risks?
  • 15. IaaS - “Pay as You Go”  Amazon, Moodle & Mobile
  • 17. Identity management  Identity strategy: provisioning and de-provisioning  The university portal: when is single sign-on appropriate  Shibboleth and federated identity  One place for "all your campus stuff"  Risks? Costs?
  • 18. One identity, infinite services Motivations  Consumerization-driven services expected  Excellent usability: fewer passwords; fewer URLs  Provisioning and removing user access easier  3rd party services never see passwords
  • 19. One password, infinite access Risks  Too much access: one password for (almost) everything  Log out confusion possible  Possible critical failure point  Social engineering weakness  Less direct control
  • 20. SSO choices  Interdependent, overlapping, standard-resistant choices  Not just services you know you will have  Complex decisions made quickly with limited information
  • 21. Additional considerations  Moving from managing systems to managing services  TRUST  Consultants vs. training  Wide net vs. standardizing support  Total cost of architecture  Redundancy  Staffing: anchoring the cloud
  • 25. Furman’s choices  SSO Easy for speed of deployment  Fischer International consulted for Shibboleth installation  Consolidation of architecture in phases  Redundancy of key systems  Moving to shibboleth standard and in-house support
  • 26. Where do Shibboleths come from?
  • 27. SAML  Security Services Technical Committee (SSTC)  3 versions:  v1.0 in 2002  v1.1 in 2003  v2.0 in 2005 (most recent version as of Apr 2013)
  • 28. SAML's building blocks  SAML Core: the data that's transmitted  assertions, requests, responses  Bindings: how the data's transmitted  ie: SOAP, HTTP POST, HTTP Redirect (GET)  Profiles: describe use cases in detail
  • 29. SAML 2.0 Profiles  SSO Profiles  Web Browser SSO Profile  Enhanced Client or Proxy (ECP) Profile  Identity Provider Discovery Profile  Single Logout Profile  Name Identifier Management Profile  Artifact Resolution Profile  Assertion Query/Request Profile  Name Identifier Mapping Profile  SAML Attribute Profiles
  • 30. SAML Flowchart Phase 1 You request a resource
  • 31. SAML Flowchart Phase 2 Login if you haven't already Here's the login! (the Single sign-on)
  • 32. SAML Flowchart Phase 3 You get the resource
  • 33. SAML Flowchart (complete) from Oasis SAML v2 Technical Overview PDF
  • 34. WAYF? Where Are You From? aka "Discovery" How the SP knows which IdP inherent in the URL, ie: furman.SP.com passed in the URL ie: SP.com/furman SAML 2.0 IdP Discovery Protocol Just ask!
  • 35. SAML Metadata  usually maintained by your Federation  adds security  SPs and IdPs specified  certificates  more maintainable  configuration stored in one place  simplifies process of adding SPs Don't mind me! I'm just the Metadata!
  • 36. Where's the Metadata?  For InCommon:  https://wayf.incommonfederation.org/InCommon/InCommon- metadata.xml  About 6 MB  Take care to configure servers properly using HTTPS!
  • 37. Additional Considerations  Service Logout vs. Session Logout  see SAML 2.0 Single Logout protocol and profile  Shibboleth IdP Clustering  Internet2 recommends Terracotta  Stateless Clustering: requires customization  Active-Passive redundant servers
  • 38. Lessons learned  Identify risks  Educate the community  Manage Change  Leadership support key  TRUST
  • 39. Challenges & opportunities  More Mobile  Virtualization  Data center in the cloud  More collaborations  When to partner?

Editor's Notes

  1. The 2007 IT Strategic Plan was over 50 pages long. Among it’s long list of goals was a tactic to “implement single sign-on”Our 2011 IT Strategic Plan was much more concise. We stated our vision as“…providing the campus community with a digital information environment that reflects and advances the high quality of Furman’s academic program and physical campus.”The Five main goals of the 2011 plan:1. Establish a new IT Service Center as the nexus of technology support excellence. 2. Champion scalable information technology innovationsand best practices.  3. Improve enterprise information systems functionality and usability. 4. Establish a state-of-the art system and processes for digital media distribution. 5. Provide a robust, consistent, and reliable campusnetwork infrastructure.You can download the plan from here: http://www2.furman.edu/sites/ITS/About/Pages/ITSReports.aspx
  2. This model was adapted from work done by the MIT Center for Information Systems Research.The MIT CISR notes that across all IT organization, not just higher ed, that typically 85% of projects are for “keeping the lights on”. The remaining 15% of projects are strategic initiatives intended to advance the digitization of the business. Better IT organizations can push this ration from 85/15 to 80/20.This pyramid shows the relative dollars of an IT project portfolio. Most investment will be in infrastructure and transaction systems.What we tell our IT Governance at Furman is to think of IT projects as an investment portfolio. Just like a financial investment portfolio, if all you make are conservative investments, you won’t achieve the same level of return as organizations that include some risk in their portfolio. We see our investment in strategic IT projects as where we are taking risks to advance the University’s business.
  3. Furman University policy requires that the CIO approve all contracts for technology purchases, leases, or services.This policy helps us work with departments as a partner to help them make the best decisions for the University’s information architecture. It also allows us to check contracts for compliance with regulations such as HIPAA, PCI-DSS, FERPA, and others. BTW- Furman is PCI SAQ B compliant – no credit card information is stored on computers on Furman’s campus; nor are there dedicated terminals used for credit card transactions on our campus network.We have also used our IT Governance process to get our campus leadership to agree that a digital platform that can be used across campus is a better approach than using disparate systems for individual departments.Finally, Furman has begun process to review projects after their implementation. This “post implementation review” helps us determine whether the original objectives of the project were met, and what others steps we should take to improve the digital platform under review.
  4. This is a very simple way of describing how we are working to unify campus access to disparate cloud systems using single sign-on from within our campus porta.
  5. While we know our portal still needs usability improvements, this is how the portal looked back in February. We’ve recently added single sign-on access to our MyFurman portal.Note: not all Furman’s cloud solutions are available from with MyFurman, just the ones with single-sign on access. (e.g. our PCI-DSS 3rd party payment solutions.)
  6. Photo is of a Microsoft data center in Washington, from NY Times article, September 24, 2012.
  7. Diagram notes that in the traditional server model, you needed to size the server for maximum capacity. SaaS cloud vendors typically sell their services at a single price, very similar to what you would expect to pay using the old on-premise model. However, many of the SaaS vendors are using other vendors cloud solutions to deliver their services.
  8. Vendors use the IaaS “Pay As You Go” model to only use as many server resources as they need.Furman has begun using Amazon for cloud services, too. We now host a Moodle instance on Amazon. We also host our edge.furman.edu mobile platform on Amazon.
  9. Check out http://edge.furman.eduWhile it looks like a responsive web application that resizes to present Furman news and digital content to the web, tablets, and smartphones, it’s also the heart of our new digital platform.Running on Amazon servers we can scale up server resources as needed. We use open source Wordpress software, and some custom design work, not only to present our mobile content, but it’s also designed to provide news content to our university web site, and digital signs on campus.
  10. Now we’re going to do a deeper dive into how identity management is at the heart of Furman’s cloud strategy.
  11. Transition: leadership perspective vs. SSO specific, Furman specific, and details specific to our choicesCan log into CNN through FacebookPortal centralizationAuto-provisioning is keyGiant targets like Box or Microsoft being compromised doesn’t get all your dataThe big benefit to the way we do identity management is that our vendors never see Furman passwords. That way, like compartments in a submarine, if one vendor’s information is compromised, information from other vendors remains secure.
  12. Same password you use to reserve a room also shows your salary informationArchitecture weakness; can keep help from being received or givenAlthough once logged in, if the server is down the service continuesOne well-placed phishing email can really hurtWorking with vendors and contracts instead of employees and systems
  13. Not all are separatechoices; standard “resistant” meaning standards are developing but are not industry-wideIndustry marketing to departments directly, glossing over the IT details
  14. Potentially different way of thinking for staffClean and quick but expensive to create and extend vs. slow and potentially messy with a high initial soft cost but hopefully low cost to extendWider support means greater flexibility when adding services, but more total support requiredYou can’t outsource “bringing it all together” – someone still has to manage all the anchors
  15. MessyCreated quickly and organically as needs arose and as we were learning
  16. So simple a child could understand itKey difference: Sharepoint 2010Most important slide we’ve shown
  17. Shibboleth canbe inserted later
  18. You can pay someone to handle it all for you – either SSO connections, Shibboleth SP control, or bothArchitecture is fairly well-documented onlineOur ADFS setup is currently robust and risk is well-mitigated; Shibboleth needs the sameIn-house support through Shibboleth gives us control, better knowledge, and controls costs; also to support the InCommon federationTransition: Shibboleth in more detail
  19. SAML is a very mature stancard
  20. The web browser SSO profile is most important
  21. Note the idp.example.org in this example is on Furman’s campus
  22. We handle getting users to understand session logout as an education challenge.
  23. What is the cloud?Security
  24. We’re considering the new Net+ Cloud VOIP solution
  25. Thanks! Here are some links to additional resources