SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
Robust Net-Centric Services
Adam Vincent, CTO Public Sector
avincent@gov.layer7tech.com
Agenda
 The Problem & Challenge with the Status Quo
 Solution: Robust Net-Centric Services
 Steps to Robustness
 Example of Problem & Solution
 Some Things To Ponder
 Conclusions




                                                                                               2
          Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Challenge with the Status Quo

                                     Life of an IT System
         Build              Certify                 Accredit                  Deploy

                            Re-Build                   Change                  Monitor

 Challenging Factors of the Status quo
  - Availability and Robustness of the Network
  - Availability (and “Reachability”) of resources to execute a particular function
  - Information Assurance (Patching, Access Control, Confidentiality, and Integrity)
  - Dynamic Cyber Defense (Monitoring, Implementing Change)




                                                                                                  3
             Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Solution: Robust Net-Centric Services

                                           The Goal

      Reactive                 Proactive                  Predictive                   Adaptive

 Robust Net-Centric Services are: net-centric services with a high degree of resilience
  even when faced with a comprehensive array of faults and/or challenges and
  inherently capable of reacting gracefully to both internal application changes as well
  as external environmental changes, all without impacting information exchange”
  Robust Net-Centric Services - December 2010 (Author Adam Vincent)
 Capable of accessing its own particular situation, and taking intelligent action based
  on its own situational awareness without impacting the consumer or provider of the
  application resource
 Capable of providing details about current operating situation to operators (mission or
  CND) and allow for administrative changed to be made without impacting the
  consumer or provider of the application resource


                                                                                                  4
           Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Requirements of Robust Net-Centric Services


        Disconnected,
      Intermittent, Low                         Messaging                   Monitoring

                  Situational Awareness
       bandwidth (DIL)

                             Location &
                                                               Mission
                              Physical
                                                              Parameters
                             Awareness


                                           Robustness
                                          Requirements
                          Intelligent Routing
                                                               SLA/QoS
                              & Variable
                                                              Enforcement
                              Transports


  Control through Policy Enforcement
           Data
      Transformations
                                                Caching and
                                                Compression
                                                                              Security




                                                                                           5
      Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Steps to Robustness

                                              Certification &
                                              Accreditation

                          Monitoring                                   Defense

                                               Mission
                                             Requirements



                             Policy                               Monitoring


 Business                                                                                    Business
Consumers                              Policy Enforcement
                                                                                             Services
                     Change becomes transparent to the
                         Messaging & Shared Services
                           User and the Service

                                Network & Communications

                                                                                                        6
        Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Example – Increasing Complexity and Cost

                        Business
                      Requirements                                                                 Business
                                                                                                 Requirements
                                                                                                                  Transport &
                                                                                                                  Networking
                                                                                                                 Requirements
              Users              Transport &
                                 Networking
                                Requirements                                                                 Service
                                                                                          Security
              Security                                                                  Requirements            New Security
            Requirements                 New Security                                                           Requirements
                                         Requirements




Deploying the Service on another Network
                                                                                           Deploying the Service on another Network

                  Business
                Requirements                                                                  Business
                                      Transport &                                           Requirements

              New                     Networking
                                     Requirements
                                                                                                                         Transport &
                                                                                                                         Networking

              Users                                                                                          Service    Requirements


                                         New Security
              Security                   Requirements
            Requirements                                                                        Security
                                                                                              Requirements            New Security
                                                                                                                      Requirements




                                                                                                                                       7
                           Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Decoupling Requirements from Services
                                               New Security
                                               Requirements


                                                 Security
                                               Requirements

                                                Transport &
                                                Networking
                                               Requirements




                                               Policy
                                                                                           Business
     Business                                                                            Requirements
   Requirements




   Users                      Policy Enforcement (Layer 7)                              Service

                                               Policy
     Business
                                              Migration                                    Business
                                                                                         Requirements
   Requirements




   Users                      Policy Enforcement (Layer 7)                              Service


                                                                                                        8
           Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Some Things To Ponder
 Policy
  - WS-Policy – Policy Framework for building domain specific policy vocabularies and allowing them to
    be used in an integrated fashion for run-time enforcement
    - Recognized by NIST, and others as way ahead
  - XACML – Policy language for access control, specifically Authorization
    - An ingredient in decoupling policy - Yes, but the answer to robustness it is not
 Policy Management
  - Needs to be interoperable across multiple product’s (enforcement points)
  - Needs to have integrated capabilities for testing, and certification
  - Needs to incorporate lifecycle - Mission owners, operators, and cyber defenders need to manage
    without stepping on each others toes. Testers, and Certifiers need to be in the loop as well.
 Monitoring
  - Monitoring of Policy Enforcement is critical but needs to be provided to both mission operators, and
    cyber defenders in different ways across various network deployments.
 Testing
  - “Run-time testing” when a new policy is added?


                                                                                                           9
            Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Conclusions

                                       Thank you!




                                         We can get there!




 Email me if you want to receive the “Robust Net-Centric Services” paper when it is
                                       available.



                                                                                              10
         Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com

Mais conteúdo relacionado

Mais procurados

Performance Measurement 02
Performance Measurement 02Performance Measurement 02
Performance Measurement 02masteryoda
 
Improved operational efficiency
Improved operational efficiencyImproved operational efficiency
Improved operational efficiencyTech Mahindra
 
Innovis Company Overview (January 2012)
Innovis Company Overview (January 2012)Innovis Company Overview (January 2012)
Innovis Company Overview (January 2012)Innovis_careers
 
Charisma CLOUD
Charisma CLOUDCharisma CLOUD
Charisma CLOUDTotalSoft
 
Cloud service architecture
Cloud service architectureCloud service architecture
Cloud service architectureJazziator
 
Oss transformation
Oss transformationOss transformation
Oss transformationRiswan
 
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...virtual-campus
 
Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用George Ang
 
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...Compuware APM
 
Negotiating Cloud Agreements The Proven Playbook
Negotiating Cloud Agreements   The Proven PlaybookNegotiating Cloud Agreements   The Proven Playbook
Negotiating Cloud Agreements The Proven Playbookadammans
 
The True Value of Grid Reliability
The True Value of Grid ReliabilityThe True Value of Grid Reliability
The True Value of Grid ReliabilityEchelon Corporation
 
Why Customer Experience Management Initiative fail?
Why Customer Experience Management Initiative fail?Why Customer Experience Management Initiative fail?
Why Customer Experience Management Initiative fail?Kedar Thakar
 

Mais procurados (19)

Performance Measurement 02
Performance Measurement 02Performance Measurement 02
Performance Measurement 02
 
Sgcp12 faulkner-cal
Sgcp12 faulkner-calSgcp12 faulkner-cal
Sgcp12 faulkner-cal
 
Improved operational efficiency
Improved operational efficiencyImproved operational efficiency
Improved operational efficiency
 
Innovis Company Overview (January 2012)
Innovis Company Overview (January 2012)Innovis Company Overview (January 2012)
Innovis Company Overview (January 2012)
 
Charisma CLOUD
Charisma CLOUDCharisma CLOUD
Charisma CLOUD
 
Cloud service architecture
Cloud service architectureCloud service architecture
Cloud service architecture
 
Oss transformation
Oss transformationOss transformation
Oss transformation
 
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
 
Tranforming the future of outsourcing
Tranforming the future of outsourcingTranforming the future of outsourcing
Tranforming the future of outsourcing
 
Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用
 
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
 
04596361
0459636104596361
04596361
 
Negotiating Cloud Agreements The Proven Playbook
Negotiating Cloud Agreements   The Proven PlaybookNegotiating Cloud Agreements   The Proven Playbook
Negotiating Cloud Agreements The Proven Playbook
 
s
ss
s
 
The True Value of Grid Reliability
The True Value of Grid ReliabilityThe True Value of Grid Reliability
The True Value of Grid Reliability
 
Energy and utilities.
Energy and utilities.Energy and utilities.
Energy and utilities.
 
Why Customer Experience Management Initiative fail?
Why Customer Experience Management Initiative fail?Why Customer Experience Management Initiative fail?
Why Customer Experience Management Initiative fail?
 
Verax OSS/BSS Suite
Verax OSS/BSS SuiteVerax OSS/BSS Suite
Verax OSS/BSS Suite
 
ProdigoMarketplace
ProdigoMarketplaceProdigoMarketplace
ProdigoMarketplace
 

Destaque

Inter-professional Education for Collaboration: Learning How to
Inter-professional Education for Collaboration: Learning How toInter-professional Education for Collaboration: Learning How to
Inter-professional Education for Collaboration: Learning How toUniversity of New Mexico
 
Wind Farm Access Vessel
Wind Farm Access VesselWind Farm Access Vessel
Wind Farm Access VesselBoyang Wang
 
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010Skills Matter
 

Destaque (6)

Company Profile
Company ProfileCompany Profile
Company Profile
 
Bermain
BermainBermain
Bermain
 
Oc Cloud Obscurity
Oc Cloud ObscurityOc Cloud Obscurity
Oc Cloud Obscurity
 
Inter-professional Education for Collaboration: Learning How to
Inter-professional Education for Collaboration: Learning How toInter-professional Education for Collaboration: Learning How to
Inter-professional Education for Collaboration: Learning How to
 
Wind Farm Access Vessel
Wind Farm Access VesselWind Farm Access Vessel
Wind Farm Access Vessel
 
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010
 

Semelhante a Layer 7: Robust Net-Centric Services

Datacenter
DatacenterDatacenter
Datacenterjayconde
 
The Rough Road toward Fixed - Mobile Convergence
The Rough Road toward Fixed - Mobile ConvergenceThe Rough Road toward Fixed - Mobile Convergence
The Rough Road toward Fixed - Mobile ConvergenceCarlos Ruiz Gomez
 
Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...EMC Forum India
 
Tc Brochure
Tc BrochureTc Brochure
Tc Brochureshylton
 
Telecom service capability methodology summary 02
Telecom  service  capability methodology  summary 02Telecom  service  capability methodology  summary 02
Telecom service capability methodology summary 02pskoularikos
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To ConsumeJeff Johnson
 
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01Newlink
 
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01Newlink
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloudInterop
 
Metasolv Post Implementation Services
Metasolv Post Implementation ServicesMetasolv Post Implementation Services
Metasolv Post Implementation ServicesProdapt Solutions
 
Veritas vision for cloud providers (screenshots)
Veritas vision for cloud providers (screenshots)Veritas vision for cloud providers (screenshots)
Veritas vision for cloud providers (screenshots)Alexschoone
 
Accelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelAccelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelOpen Data Center Alliance
 
Delivering Benefits With A Smarter Grid September 2011
Delivering Benefits With A Smarter Grid   September 2011Delivering Benefits With A Smarter Grid   September 2011
Delivering Benefits With A Smarter Grid September 2011forrestsmall
 
ITExpo West Conference Highlights from Alan Quayle 2012
ITExpo West Conference Highlights from Alan Quayle 2012ITExpo West Conference Highlights from Alan Quayle 2012
ITExpo West Conference Highlights from Alan Quayle 2012Alan Quayle
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance ManagementRiverbed Technology
 
Thoughts on Utility, Grid, on demand, cloud computing and appliances
Thoughts on Utility, Grid, on demand, cloud computing and appliancesThoughts on Utility, Grid, on demand, cloud computing and appliances
Thoughts on Utility, Grid, on demand, cloud computing and appliancesMark Cathcart
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfAnil
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Erik Ginalick
 
Vaibhav Misra Telecom Wireless Operations Management Consulting Presentation
Vaibhav Misra Telecom Wireless Operations Management Consulting PresentationVaibhav Misra Telecom Wireless Operations Management Consulting Presentation
Vaibhav Misra Telecom Wireless Operations Management Consulting PresentationVaibhav Misra
 
Ca partner day - qualità servizi - roma 1 di 2
Ca partner day - qualità servizi - roma 1 di 2Ca partner day - qualità servizi - roma 1 di 2
Ca partner day - qualità servizi - roma 1 di 2CA Technologies Italia
 

Semelhante a Layer 7: Robust Net-Centric Services (20)

Datacenter
DatacenterDatacenter
Datacenter
 
The Rough Road toward Fixed - Mobile Convergence
The Rough Road toward Fixed - Mobile ConvergenceThe Rough Road toward Fixed - Mobile Convergence
The Rough Road toward Fixed - Mobile Convergence
 
Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...
 
Tc Brochure
Tc BrochureTc Brochure
Tc Brochure
 
Telecom service capability methodology summary 02
Telecom  service  capability methodology  summary 02Telecom  service  capability methodology  summary 02
Telecom service capability methodology summary 02
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
 
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
 
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloud
 
Metasolv Post Implementation Services
Metasolv Post Implementation ServicesMetasolv Post Implementation Services
Metasolv Post Implementation Services
 
Veritas vision for cloud providers (screenshots)
Veritas vision for cloud providers (screenshots)Veritas vision for cloud providers (screenshots)
Veritas vision for cloud providers (screenshots)
 
Accelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelAccelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, Intel
 
Delivering Benefits With A Smarter Grid September 2011
Delivering Benefits With A Smarter Grid   September 2011Delivering Benefits With A Smarter Grid   September 2011
Delivering Benefits With A Smarter Grid September 2011
 
ITExpo West Conference Highlights from Alan Quayle 2012
ITExpo West Conference Highlights from Alan Quayle 2012ITExpo West Conference Highlights from Alan Quayle 2012
ITExpo West Conference Highlights from Alan Quayle 2012
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
 
Thoughts on Utility, Grid, on demand, cloud computing and appliances
Thoughts on Utility, Grid, on demand, cloud computing and appliancesThoughts on Utility, Grid, on demand, cloud computing and appliances
Thoughts on Utility, Grid, on demand, cloud computing and appliances
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863
 
Vaibhav Misra Telecom Wireless Operations Management Consulting Presentation
Vaibhav Misra Telecom Wireless Operations Management Consulting PresentationVaibhav Misra Telecom Wireless Operations Management Consulting Presentation
Vaibhav Misra Telecom Wireless Operations Management Consulting Presentation
 
Ca partner day - qualità servizi - roma 1 di 2
Ca partner day - qualità servizi - roma 1 di 2Ca partner day - qualità servizi - roma 1 di 2
Ca partner day - qualità servizi - roma 1 di 2
 

Mais de CA API Management

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarCA API Management
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...CA API Management
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...CA API Management
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...CA API Management
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataCA API Management
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...CA API Management
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device UniverseCA API Management
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...CA API Management
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...CA API Management
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinCA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...CA API Management
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...CA API Management
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...CA API Management
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 

Mais de CA API Management (20)

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 

Último

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Último (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Layer 7: Robust Net-Centric Services

  • 1. Robust Net-Centric Services Adam Vincent, CTO Public Sector avincent@gov.layer7tech.com
  • 2. Agenda  The Problem & Challenge with the Status Quo  Solution: Robust Net-Centric Services  Steps to Robustness  Example of Problem & Solution  Some Things To Ponder  Conclusions 2 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 3. Challenge with the Status Quo Life of an IT System Build Certify Accredit Deploy Re-Build Change Monitor  Challenging Factors of the Status quo - Availability and Robustness of the Network - Availability (and “Reachability”) of resources to execute a particular function - Information Assurance (Patching, Access Control, Confidentiality, and Integrity) - Dynamic Cyber Defense (Monitoring, Implementing Change) 3 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 4. Solution: Robust Net-Centric Services The Goal Reactive Proactive Predictive Adaptive  Robust Net-Centric Services are: net-centric services with a high degree of resilience even when faced with a comprehensive array of faults and/or challenges and inherently capable of reacting gracefully to both internal application changes as well as external environmental changes, all without impacting information exchange” Robust Net-Centric Services - December 2010 (Author Adam Vincent)  Capable of accessing its own particular situation, and taking intelligent action based on its own situational awareness without impacting the consumer or provider of the application resource  Capable of providing details about current operating situation to operators (mission or CND) and allow for administrative changed to be made without impacting the consumer or provider of the application resource 4 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 5. Requirements of Robust Net-Centric Services Disconnected, Intermittent, Low Messaging Monitoring Situational Awareness bandwidth (DIL) Location & Mission Physical Parameters Awareness Robustness Requirements Intelligent Routing SLA/QoS & Variable Enforcement Transports Control through Policy Enforcement Data Transformations Caching and Compression Security 5 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 6. Steps to Robustness Certification & Accreditation Monitoring Defense Mission Requirements Policy Monitoring Business Business Consumers Policy Enforcement Services Change becomes transparent to the Messaging & Shared Services User and the Service Network & Communications 6 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 7. Example – Increasing Complexity and Cost Business Requirements Business Requirements Transport & Networking Requirements Users Transport & Networking Requirements Service Security Security Requirements New Security Requirements New Security Requirements Requirements Deploying the Service on another Network Deploying the Service on another Network Business Requirements Business Transport & Requirements New Networking Requirements Transport & Networking Users Service Requirements New Security Security Requirements Requirements Security Requirements New Security Requirements 7 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 8. Decoupling Requirements from Services New Security Requirements Security Requirements Transport & Networking Requirements Policy Business Business Requirements Requirements Users Policy Enforcement (Layer 7) Service Policy Business Migration Business Requirements Requirements Users Policy Enforcement (Layer 7) Service 8 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 9. Some Things To Ponder  Policy - WS-Policy – Policy Framework for building domain specific policy vocabularies and allowing them to be used in an integrated fashion for run-time enforcement - Recognized by NIST, and others as way ahead - XACML – Policy language for access control, specifically Authorization - An ingredient in decoupling policy - Yes, but the answer to robustness it is not  Policy Management - Needs to be interoperable across multiple product’s (enforcement points) - Needs to have integrated capabilities for testing, and certification - Needs to incorporate lifecycle - Mission owners, operators, and cyber defenders need to manage without stepping on each others toes. Testers, and Certifiers need to be in the loop as well.  Monitoring - Monitoring of Policy Enforcement is critical but needs to be provided to both mission operators, and cyber defenders in different ways across various network deployments.  Testing - “Run-time testing” when a new policy is added? 9 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 10. Conclusions Thank you! We can get there! Email me if you want to receive the “Robust Net-Centric Services” paper when it is available. 10 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com