Identity Proofing in the Cloud

Slides:



Advertisements
Similar presentations
Cloud computing is used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication.
Advertisements

Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Obstacles Security Culture Cloud Cloud Computing will be the primary delivery model, the big question is how fast is going to get there. The cost is the.
C LOUD C OMPUTING Presented by Ye Chen. What is cloud computing? Cloud computing is a model for enabling ubiquitous, convenient, on- demand network access.
© 2009 IBM Corporation ® IBM Software Group Introduction to Cloud Computing Vivek C Agarwal IBM India Software Labs.
Cloud Usability Framework
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
Cloud Computing Guide & Handbook SAI USA Madhav Panwar.
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Duncan Fraiser, Adam Gambrell, Lisa Schalk, Emily Williams
SOFTWARE AS A SERVICE PLATFORM AS A SERVICE INFRASTRUCTURE AS A SERVICE.
EA and IT Infrastructure - 1© Minder Chen, Stages in IT Infrastructure Evolution Mainframe/Mini Computers Personal Computer Client/Sever Computing.
Plan Introduction What is Cloud Computing?
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
CLOUD COMPUTING. IAAS / PAAS / SAAS LAYERS. Olena Matokhina Development and Consulting Team Lead 2 ABOUT PRESENTER.
Source: Forrester 2008 configurability multi- tenant efficiency, scalability.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
Clouds on IT horizon Faculty of Maritime Studies University of Rijeka Sanja Mohorovičić INFuture 2009, Zagreb, 5 November 2009.
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Cloud Computing Source:
Introduction to Cloud Computing
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Effectively Explaining the Cloud to Your Colleagues.
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Achieving Agility with WSO2 App Factory S. Uthaiyashankar Director, Cloud Solutions WSO2 Inc. Dimuthu Leelarathne Software Architect WSO2 Inc.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Virtual techdays INDIA │ november 2010 A Walk In The Cloud: A Primer on the What, Why and How of Cloud Computing Jatin Sheth │ Services Partner Lead,
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
The Legal Issues Facing Digital Forensic Investigations In A Cloud Environment Presented by Janice Rafraf 15/05/2015Janice Rafraf1.
In the name of God :).
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
2009 Federal IT Summit Cloud Computing Breakout October 28, 2009.
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
PaaSport Introduction on Cloud Computing PaaSport training material.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
Martijn Vlek Sr Director Fusion Middleware Oracle EMEA
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Web Technologies Lecture 13 Introduction to cloud computing.
Bay Ridge Security Consulting (BRSC) Cloud Computing.
3/14/2016 © Crown Copyright. All rights reserved. Risk Managed Cloud Computing HMG IA Approach Ian McCormack TD IA Policy and Risk CESG.
RANDY MODOWSKI COSC Cloud Computing. Road Map What is Cloud Computing? History of “The Cloud” Cloud Milestones How Cloud Computing is being used.
Submitted to :- Neeraj Raheja Submitted by :- Ghelib A. Shuaib (Asst. Professor) Roll No : Class :- M.Tech(CSE) 2 nd Year.
Innovative Partnership Solution-Driven Commitment Agile Value Sustainable.
Software as a Service (SaaS) Fredrick Dande, MBA, PMP.
Template V.17, July 29, 2011 What’s the Cloud Got to do with HR Transformation? Heath Brownsworth, Director Technology Strategy.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Welcome To We have registered over 5,000 domain names and host over 1,500 cloud servers for individuals and organizations, Our fast and reliable.
Agenda  What is Cloud Computing?  Milestone of Cloud Computing  Common Attributes of Cloud Computing  Cloud Service Layers  Cloud Implementation.
Unit 3 Virtualization.
Introduction to Cloud Computing
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Federated IdM Across Heterogeneous Clouding Environment
Cloud Computing Kelley Raines.
Chapter 21: Cloud Computing and Related Security Issues
Introduction to Cloud Computing
Cloud Computing.
Chapter 22: Cloud Computing Technology and Security
CNIT131 Internet Basics & Beginning HTML
Cloud Computing Dr. Sharad Saxena.
In-Class Activity… Cloud Computing.
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Identity Proofing in the Cloud
Cloud Computing: Concepts
Fundamental Concepts and Models
Cloud Computing LegalRun Solutions Why It’s Right for You!
Basics of Cloud Computing
Presentation transcript:

Identity Proofing in the Cloud February 15, 2012 Greg Capella Deputy Executive Director DHS/OCIO/ESDO

Established on November 25, 2002 DHS’s History Established on November 25, 2002 Cabinet level post created Incorporated 22 agencies into one organization “The creation of DHS constituted the most significant government reorganization since the Cold War, and the most substantial reorganization of federal agencies since the National Security Act of 1947” Reference: Peter Andreas: “Redrawing the line “

DHS Data Center Consolidation Consolidating to 2 operational centers Lift and shift approach not viable Expensive Inefficient for most applications Takes too long New guidance reinforced desire for a “better way” Enhance Security Posture and Information Sharing Capabilities

“Shift to a “Cloud First” policy” IT Reform @ DHS IT Reform @ DHS Departmental Plan Federal Plan Cloud First Enable and leverage secure XaaS (i.e., SaaS, PaaS, IaaS) Standup and enable IT commodity services (e.g., SharePoint, Email, CRM, and Auth as a Service, Service Catalog) Public and Private Offerings Consolidate IT Assets Data Center consolidation (i.e., EDC) Network consolidation (i.e., OneNet) IT buying services (i.e., EAGLE II, FirstSource II, GSA IaaS) ICAM Collaboration & Best Practices IT Councils (i.e., ASC, SIOC, CISOC, etc) Executive Steering Committees (ESCs) (i.e., TASC, Screening, HC/HR, etc) Portfolio Governance and Integrated Investment Lifecycle (i.e., PMCOE, SEWG, etc) FedSpace/Best Practice Platform The department views the benefits of this transformative approach include: A disruptive shift from the legacy business model of building custom systems to adopting pre-built, secure, multi-tenant solutions. Move to a pay per use model and reduce Capital Expenditure risk exposure Improve operating efficiencies by leveraging  cloud based solutions to efficiently share demand, and costs across infrastructure assets and reduce the overall reserve capacity across the enterprise. Robust governance and Acquisition models are being developed to enable greater efficiencies and improved mission performance Leverage shared services of “commodity” applications such as e-mail and Sharepoint across functional organizations allowing redirection towards value-added activities. Agile - Deploy working business functionality in release cycles no longer than 6 months, with initial deployment to end users no later than 18 months after programs begins. Adopting an open-sourced business model to improve reuse across enterprise and mission services, code and infrastructure. “Shift to a “Cloud First” policy” 4/21/2017

“Private and Public Cloud Services” DHS established a model for enabling available, secure, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud Attributes 1. Services Based Computing resources are consumed as services 2. Multi Tenant Resources are shared among many customers Reuse – Source Forge Concept 3. Pay Per Use Customers pay based on usage; not for full stand up 4. Scalable and Elastic Resources and provisioned or released in near real-time 5. Access Role Based access and Authentication 6. Compliant Security Profile for Production Environment 508 Compliant Templates Cloud Services Software as a Service (SaaS): Delivery of business applications over the Intranet on demand. Customers leverage ESDO development capabilities to provide complete end-user applications. Platform as a Service (PaaS): Delivery of a combination of infrastructure and “middleware” software combined together Provides an end-to-end software development and production pipeline in a “hosted” model on demand. Customers use the platform solutions develop and launch new applications Infrastructure as a Service (IaaS): Customers use the secure, reusable infrastructure to run their platform and business services Delivery of technology infrastructure on demand (e.g., network, servers, memory, storage, and database). The Public Cloud: Leverages commercial service delivered over the Internet in real time as a fully outsourced service. The infrastructure is managed by the supplier in supplier-owned facilities. DHS can provision and access the infrastructure via the internet. Non – Sensitive Data The Private Cloud: Virtualization and distributed computing allows DHS datacenter providers to provide most efficient processes and resources to meet the needs of the Department. Sensitive Data Includes increased scalability, metering, and time-to- market benefits of a public cloud service while incorporating DHS control and security across a virtualized infrastructure. 4/21/2017

DHS Identity Proofing in the Cloud VIS provides ability for employer to confirm workers right to work in US Congress requested the DHS (USCIS) create a program so the worker could check their status Confirm right to work Obtain information on next steps if there was an issue DHS (USCIS) created the SelfCheck program to provide this capability to workers

www.uscis.gov/everifyselfcheck

Identifying Information

Self Check: Identity Proofing in the Cloud US Workforce: Self Check is available to the entire US workforce, regardless of employment with an E-Verify employer Identity Assurance: Level 2 Identity Proofing, including knowledge based questioning, ensures Self Check is only used by identity information owners Web Based: Self Check is offered over the Internet and other channels are being investigated Fraud Prevention: A user is only able to use Self Check if he is able to successfully authenticate his identity One of Services we have already deployed in the public Cloud. Allows workers to check their employment eligibility status on-line. First of its kind in the government. Self Check Employment Eligibility Verification: Self Check returns either an affirmative response or any data mismatches found in DHS or SSA records Results Sample Sample Sample X Sample Mismatch Resolution: Users receive instructions on how to correct any data mismatches in SSA or DHS records E-Verify Self Check March 2010

DHS has embraced both the Public and Private Clouds Summary DHS has embraced both the Public and Private Clouds Reduce costs and time to deploy Increase flexibility and responsiveness Decrease carbon footprint Decrease floor space DHS is rolling out numerous Public and Private Cloud efforts Need to apply sound security management practices to use Clouds safely and effectively