service model security implications 2012
DESCRIPTION
Mike & JP discuss security for each service model from the perspective of service providers and service consumers.TRANSCRIPT
![Page 1: Service model security implications 2012](https://reader036.vdocuments.mx/reader036/viewer/2022062704/55592a6cd8b42a4f3d8b465b/html5/thumbnails/1.jpg)
Implications for security delivery: Saas, PaaS, and IaaS and virtualized environments
Mike Kavis, InmarVP, Digital Promotions Systems
January 24, 2012
JP Morgenthal, SmartronixCloud Evangelist
![Page 2: Service model security implications 2012](https://reader036.vdocuments.mx/reader036/viewer/2022062704/55592a6cd8b42a4f3d8b465b/html5/thumbnails/2.jpg)
®
© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar
2
How do we secure these
different service
models?
![Page 3: Service model security implications 2012](https://reader036.vdocuments.mx/reader036/viewer/2022062704/55592a6cd8b42a4f3d8b465b/html5/thumbnails/3.jpg)
®
© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar
3
On Premise
IaaS
PaaSSaaS
Amount of security outsourced
Amou
nt o
f sta
ndar
diza
tion
requ
ired
Service Models Realities
![Page 4: Service model security implications 2012](https://reader036.vdocuments.mx/reader036/viewer/2022062704/55592a6cd8b42a4f3d8b465b/html5/thumbnails/4.jpg)
®
© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar
4
On-Premise
Network
Server
Application
ID Management
OS
Authentication
Access
Storage
Authorization
Application configuration
Consumer
It’s ALL you!
![Page 5: Service model security implications 2012](https://reader036.vdocuments.mx/reader036/viewer/2022062704/55592a6cd8b42a4f3d8b465b/html5/thumbnails/5.jpg)
®
© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar
5
Network
IaaS
Server
Application
ID Management
OS
Authentication
Access
Storage
Authorization
Application configuration
Consumer
Provider Network
Outsourcing the security perimeter
Server Storage
![Page 6: Service model security implications 2012](https://reader036.vdocuments.mx/reader036/viewer/2022062704/55592a6cd8b42a4f3d8b465b/html5/thumbnails/6.jpg)
®
© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar
6
Server OS Storage
PaaS
Application
ID Management
Authentication
Access
Authorization
Application configuration
Perimeter
Server OS Storage
Consumer
Provider
Outsourcing the application platform
Authentication
![Page 7: Service model security implications 2012](https://reader036.vdocuments.mx/reader036/viewer/2022062704/55592a6cd8b42a4f3d8b465b/html5/thumbnails/7.jpg)
®
© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar
7
Application Authentication Authorization
SaaS
Perimeter
Server
Application
ID Management
OS
Authentication
Access
Storage
Authorization
Application configuration
Consumer
Provider
Outsourcing the application
Access
![Page 8: Service model security implications 2012](https://reader036.vdocuments.mx/reader036/viewer/2022062704/55592a6cd8b42a4f3d8b465b/html5/thumbnails/8.jpg)
®
© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar
Common across all service models
SLAs
Compliance
Privacy
ChangeControl
Controls