SOA Security Chapter 12 SOA for Dummies. Outline User Authentication/ authorization Authenticating Software and Data Auditing and the Enterprise Service.

Slides:



Advertisements
Similar presentations
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Advertisements

Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Grid Security. Typical Grid Scenario Users Resources.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security Controls – What Works
Information Security Policies and Standards
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Presented by Amlan B Dey.  Access control is the traditional center of gravity of computer security.  It is where security engineering meets computer.
Troubleshooting Windows Vista Security Chapter 4.
CSAS 2009 Running Windows as a Non- Administrator or how I learned to love “User” By: Kasey Dennler.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Identity on Force.com & Benefits of SSO Nick Simha.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
ACM 511 Introduction to Computer Networks. Computer Networks.
 Focus on various part of the operating system can achieve the security and protection according to the organization’s requirement.  External and internal.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Understand Permissions LESSON Security Fundamentals.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Computer Security By Duncan Hall.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Click to edit Master subtitle style Norton Antivirus Customer Service
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Information Security and Privacy in HRIS
8 – Protecting Data and Security
Security Issues in Information Technology
Malware and Computer Maintenance
Grid Security.
Chapter 17 Risks, Security and Disaster Recovery
Active Directory Administration
Module 8: Securing Network Traffic by Using IPSec and Certificates
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
THE STEPS TO MANAGE THE GRID
Computer Ethics.
ISNE101 Dr. Ken Cosh Week 13.
Microsoft Office Access 2003
Module 8: Securing Network Traffic by Using IPSec and Certificates
Topic 5: Communication and the Internet
Management Application for all segments
Presentation transcript:

SOA Security Chapter 12 SOA for Dummies

Outline User Authentication/ authorization Authenticating Software and Data Auditing and the Enterprise Service Bus SOA security in summary

Authentication Who’s That User?

Authorization Can I Let You Do That? If you already know who is making a request, all you then need to do is find out whether the user is allowed to do what she is requesting. – if our esteemed user has a perfect right to do what she has requested, you’d really rather not get in her way. She’ll only get upset if you hold her up. Example – Consider a business rule that only a manager can approve an order with a value of more than $15,000. – If a user who is not a manager tries to approve such an order, the order needs to be redirected to a manager for authorization rather than just being processed.

Security Challenges You need to know/keep track of information at all times, not just when he logs in. – who the user is and – what rights he has Solution? – Manage Identity

Identity Management software The software that determines what a user is allowed to do. It provides an identity service that can span a network — even multiple networks, if necessary. Add the identity service – A part of SOA – SOA really needs such a service.

Identity Management W/SOA Portal – as a window that contains a menu of all the applications available throughout the whole network that the user is able to run. – the user can home in on a particular application found on this menu, activate it, and then run with it. identity management software – provides the portal with all the identity information it needs to connect the user to the application. – is complicated because it can mean logging on to other computers and providing one or more passwords and doing it all securely. – knows what the user is entitled to run and knows what hurdles need to be jumped, so it can provide whatever validation is required at any point in order to get the user connected to the application.

Identity Management W/SOA You are no longer connected to an application but rather to a business service. You are dealing with components that have been connected together to provide service. What if you want to use only a particular component of that application. – system better provide user credentials to every component.

How it works? User logged in Identity management service create security token security token contains credentials, including the identity of the user and the details of the access rights of the user. security token is encrypted, so it can be read only by software you trust. The user requests a business service through the portal The portal contacts the service broker, passing it a security token The service broker can deliver this token to every component the user accesses. When received, it can be decrypted by each component so that “who is doing what” is known.

Benefits Keep track of who did what and how – issued credentials Making security policy and storing it in the SOA registry – no longer store authorization rules in the application You need to store them along with the business process metadata in, of course, the SOA registry. – don’t really need to authorize staff to use an application, you need to authorize them for specific business processes. – may need to authorize them only up to certain limits for specific business processes.

Software fingerprints One of the things that anti-virus software vendors do is have their programming teams come up with “signatures” of undesirable software – undesirable software: Trojans, worms, viruses, and other malware – so that the anti-virus software can recognize a virus when it comes across one. These signatures are software fingerprints, – in the sense that they are unique to the virus. Every time a new virus emerges, a new fingerprint is created and distributed to the anti-virus software running on your PC.

Software Authentication The authentication of software identity can be carried out in a way similar to the authentication of user identity. – hold something that is unique to the software, – Before allow it to run, you carry out an authentication test to make sure nobody has tampered with the software since it was last used. This approach stops any illegitimate programs from running.

How it works? Consider first that no business service will be put into operation without going through governance procedures. – When a new version of a business service has been adequately tested and is ready, every software component of it is fingerprinted, – and its unique fingerprint is updated. – These fingerprints are stored in the signature file by the software authentication component. When a request is made to the service broker to run a business service, – the broker passes the address of each component of the service to the software authentication process, which then tests it and passes it (or rejects it). – the service broker then executes each component, the service is available for use.

Data Security Establishing SOA data governance and auditing services is to enable and manage the enforcement of business and security policy as it is applied to data Data auditing ensures that an organization can manage and adhere to requirements imposed by regulatory agencies and that access to data is kept confidential. – Who has access to sensitive data? – When was it accessed and by whom? – How can I track data that may have been deleted?

Auditing and the Enterprise Service Bus Does your own staff isn’t using your software in an entirely “legitimate” way? – For example, if they have access rights to the payments system, they might simply start writing themselves checks. Need to monitor all the activities – audit trails

Audit Challenge Problem with audit trails within a SOA is – the operation of the business service is split across multiple components Solution – The use of an enterprise service bus for all messaging will resolve the problem – because the ESB can keep an audit trail of all the messages that are passed – Additionally, if there is any concern about data privacy in passing data from one component to another most enterprise service buses will also be able to encrypt the data as it passes back and forth. – Void some hidden listening software taking notes

Summary In order to address this risk, three aspects of SOA business services need attention: – Identity management – Software and data authentication – Audit trails