Effective Identity Management needs a very high level of commitment from the corporates and needs dedicated resources to get this accomplished. Typically, Identity Management in the Cloud requires the following to be in place:
- Establishing a Credentials database
- Managing Use Access Rights
- Enforcing the Security Policy
- Developing the capability to create & modify user accounts
- Setting up monitoring of resource accesses
- Setting up a process for removing access rights
- Provide training on the processes
The Open Group and WWW Consortium (W3C) are working towards a global standard for Identity Management System that would be interoperable, provide for privacy, implement accountability and be portable. Identity Management is also being addressed by the XML based eXtensible Name Service (XNS) open protocol for universal addressing and provides a permanent identification address for a container of an individual's personal data & contact information. XNS also provides means to verify whether an individual's contact information is valid and a platform for negotiating the information exchange.
Benefits of Identity Management in a Public vs Private Cloud
The ultimate solution is Autonomic Security. This is a self managing computing model in which systems reconfigure themselves in response to changing conditions and are self healing - something similar to the likes of Terminator or i-Robot...! It's still somewhere in the future but mind it, people have already started thinking about it and are working on many prototypes that will change the Cloud Identity Management!
Benefits of Identity Management in a Public vs Private Cloud
Public
Cloud
·
Implementation best practices
(example: provisioning/business use cases, etc.) gained over other customers
can be reused in a cost effective manner during similar deployments for a new
deployment
·
Security and SLA are at higher
risks due to public exposure and a complex shared environment (network
complexity)
·
ROI - cost effective in the short
term
|
Private
Cloud
·
Implementation expertise (example:
development/technical) gained within the enterprise reduces further integration
(wider and broader) costs & time
·
Shared Services architecture can
be easily reused across the enterprise to easily drive other business
requirements
·
Compliance and regulation
requirements may be easily monitored/enforced within the company
·
ROI - cost effective over the long
term
|
The ultimate solution is Autonomic Security. This is a self managing computing model in which systems reconfigure themselves in response to changing conditions and are self healing - something similar to the likes of Terminator or i-Robot...! It's still somewhere in the future but mind it, people have already started thinking about it and are working on many prototypes that will change the Cloud Identity Management!
References: Oracle.com, Cloud Security - Ronald L Krutz & Russell Dean Vines
Also posted on BMC Communities
Also posted on BMC Communities
Informative blog which focus on Implementation of Identity management in private and public cloud..
ReplyDeleteCloud Access Identity Management is the leading identity infrastructure-as-a-service solution with centralized administration.It manages user accounts,enforces user access policy and provides necessary auditing and reporting..
keep continue sharing such useful post
Industry Reports