You are on page 1of 6

IBM Software Solution Brief

Tivoli

IBM Tivoli Access


Management for cloud
and SOA environments
Enabling secure access to new service delivery
platforms

Organizations today are continually seeking new ways to deliver


Highlights applications and services efficiently and cost effectively. Many are
already using Web services or service-oriented architecture (SOA)
● Improve security by knowing who is implementations to provide access to on-premise and off-premise
connecting to on- and off-premise
services applications, while increasing numbers are exploring cloud computing
as a delivery platform. These alternatives to traditional IT infrastruc-
● Increase business flexibility by reducing
tures can help reduce IT and application development costs, increase
the complexity of adding new services
opportunities for collaboration, and drive business growth. At the same
● Facilitate compliance by enabling end- time, however, they can create new vulnerabilities, exposing access to
to-end auditing of user access
applications and services beyond traditional organizational boundaries.
Organizations therefore require more than traditional IT security to
manage and protect access to these applications and services.

IBM Tivoli® Access Management solutions are designed to enable


secure access to applications and services in nontraditional delivery
platforms such as cloud and SOA deployments. They specifically pro-
vide capabilities that are essential to:

● Secure access to on- and off-premise deployments of applications and


services by reducing the risk of inconsistent security policies.
● Manage user access in SOA deployments where the introduction of
Web services is transforming the IT environment.
● Secure access to hybrid cloud deployments, in which organizations
leverage the benefits of the cloud while still protecting sensitive
information that may be at risk.
IBM Software Solution Brief
Tivoli

Secure access to on- and off-premise


deployments
Securing access to on- and off-premise
Many public sector organizations—particularly those engaged
applications and services
heavily in customer services—increasingly interact, collabo-
Government
rate and exchange data with other organizations in order to Revenue Agency Trusted Partner/
deliver services efficiently and cost effectively. For example, Hybrid Cloud
On-premise
in the scenario illustrated below, a government revenue Private Cloud
agency needs to be able to engage and exchange information
with trusted partners such as providers of tax preparation Tax Preparation Service
services, as well as with entities such as credit score service
Tax Form Application
companies. In this scenario, numerous internal and external
users will require access to both on-premise and off-premise • Federated Identity
Dynamic • Security Events
applications, in environments including Software as a Service Infrastructure
• Data Entitlements
deployments and cloud computing.
Public Cloud
The key to securing access to both on- and off-premise appli-
cations and services in this scenario is to build on the existing
identity and access management infrastructure and use it to
Credit Score Service
support a scalable and highly available solution for secure
access to transformed resources. Additional requirements for
the existing infrastructure include federated access control
and data entitlement management. These enable organiza-
tions to establish the user’s identity and organizational trust Collaboration requires secure user access to on-premise and off-premise
applications by internal and external users.
necessary to achieving secure collaboration. For example, in
the following diagram, the credit score service provider oper-
ating in the public cloud has to be certain that the party security domains and facilitates secure access to applications
requesting information really is the government revenue in on- and off-premise deployments. Data entitlement man-
agency or tax preparer they claim to be, as opposed to a agement provides a centralized approach to managing and
hacker seeking unauthorized access to the information in an enforcing security policies to control access to data and appli-
individual’s credit history. cations. When multiple applications and services are being
deployed, this alternative provides significant benefits over
Federated access control and data entitlement management implementing distinct security policies to control access to
also reduce the risk of inconsistent access to on- and each one separately.
off-premise applications and services. In particular, federated
access control simplifies the process of integrating ever-
increasing amounts of information contained in different

2
IBM Software Solution Brief
Tivoli

Secure access in SOA and Web services Secure hybrid cloud and SaaS
deployments deployments
Many organizations are implementing SOA to transform Throughout the consumer and public sectors, cloud comput-
their IT and application environments and deploy large num- ing is proving a flexible and cost-effective means of delivering
bers of Web services to support business needs. For example, IT services over the Internet. Cloud resources can be rapidly
utility companies that install smart meters on customers’ deployed and easily scaled, with applications and services pro-
premises are introducing more Web services into their tech- visioned on demand, regardless of user location. This brings
nology environments. One of the advantages of installing benefits such as the ability to increase service delivery effi-
smart meters is more efficient, lower-cost operations, because ciencies, streamline IT management, and align IT services
the smart meters can send customer usage data directly to the with business requirements. But for many organizations,
utility company’s SOA-based IT environment—rather than these benefits are perceived to have an associated cost and
requiring their employees to physically go out and read the risk: the challenge of security. In addition to the usual
meters. Because the meters use Web service interfaces to challenges of developing secure IT systems, cloud computing
transmit this data, those Web services must be secured within can add risk because essential services are often externalized
the SOA environment. in the cloud model. In a hybrid cloud model, an organization
could engage a cloud provider to host their services while
Web services can be secured by offering security as an maintaining ownership of the data. This requires a high
operational service that can be consumed directly by the level of trust in the providers and how they bring security to
applications and services within the architecture. The key is the organization’s critical data.
to take a policy-based approach that incorporates security
management capabilities and runtime security services that There are several types of clouds, and not all of them have
can be integrated easily within existing SOA components the same security requirements. Clouds can be private, in
such as the XML firewall, enterprise service bus (ESB), and which the cloud is owned by a single organization, or public,
service registries and repositories. Effective security policy in which the cloud is available to anyone with Internet access.
management must include message protection and fine- The categories of service delivered in cloud models include
grained entitlement management capabilities for strengthen- Software as a Service (SaaS), Platform as a Service (PaaS) and
ing data security by centrally administering and enforcing Infrastructure as a Service (IaaS). Many organizations elect to
permissions and data-level controls within applications combine the private and public models to form a hybrid
and services. cloud to meet specific business and technology requirements.

Enabling security as a service for SOA environments can help


utility companies and other organizations that provide serv-
ices to reduce deployment costs as they roll out new services,
by reducing the complexity of securely bringing new services
online.

3
IBM Software Solution Brief
Tivoli

Addressing security requirements for different clouds

Collaboration CRM/ERP/HR
(Federation)
SaaS

Security Enabled
Business Industry
Processes Applications

Software as a Service

Web 2.0 Application Java Runtime


Runtime (Security) Security as Runtime
PaaS

Middleware Database Development


Tooling

Platform as a Service

Servers Data Center Security Security as Service


Fabric (IAM and SIEM)
laaS

Networking Storage

Infrastructure as a Service

Different types of clouds may have different security requirements.

With the SaaS deployment, most of the responsibility for The key to securing these cloud-based services is leveraging
security management lies with the cloud provider, who can an end-to-end security strategy that brings together the
take advantage of a number of ways to control access, includ- identity and access management foundation (including data
ing user identity management. The PaaS deployment allows entitlement management capabilities) that exists within the
the organization that is employing the cloud to assume organization and the federated access control and runtime
more responsibility for managing the security of middleware, security services that are deployed in the cloud. To do this
database software and application runtime environments. The successfully requires having data center network and virtual-
IaaS deployment transfers even more control to the organiza- ization security in place so that migration of applications and
tion. In a hybrid environment, organizations can leverage the services to the cloud is inherently secure.
benefits of these models without the security risk inherent in
a public deployment.

4
IBM Software Solution Brief
Tivoli

Security plays two key roles in cloud deployments: to enable and distributed policy enforcement across cloud-based serv-
organizations to establish secure cloud-based service deploy- ices. Data entitlement management makes it possible to man-
ments, and to offer security as a service in the cloud to age and enforce data security policies associated with
support new applications that are being built for cloud different services and applications, rather than having to
deployment. The practical security solution for hybrid cloud deal with multiple policies that all have product-specific
computing is a defense in depth approach that addresses both definitions. With the rapid deployment of Web services, this
the ability to use powerful internal security capabilities as a capability helps reduce the time and cost to manage security
basis for extending into cloud computing and the ability to policies and also reduces the risk of deploying inconsistent
use security as a service to easily run access federation, access control policies and providing unintended access to
entitlements management and other security runtime sensitive data.
enforcement capabilities directly in the cloud.
IBM WebSphere® DataPower® SOA Appliances are connec-
Enhance security with IBM Tivoli Access tivity and XML firewall devices that can help secure and
Management for cloud and SOA accelerate your SOA and Web services transformation. By
IBM security solutions provide key capabilities required in providing on-demand integration as part of the SOA infra-
the identity and access management infrastructure to secure structure, WebSphere DataPower SOA Appliances represent
access for cloud and SOA environments, including the fol- one of the few non-disruptive technologies for application
lowing offerings. optimization and integration. Tivoli Access Management
solutions for SOA environments are designed specifically to
IBM Tivoli Federated Identity Manager provides federated integrate out of the box with WebSphere DataPower SOA
single sign-on (SSO) techniques to secure user access to Appliances and support centralized SSO, user session man-
on- and off-premise applications and services and simplify agement, and consistent security policy management to help
application, SaaS and cloud-based services integration using demonstrate compliance.
multiple forms of user credentials. It facilitates secure infor-
mation sharing between trusted partners, and it incorporates IBM Security Virtual Server Protection for VMware is an
an identity mediation service to manage, map and propagate essential component of the underlying infrastructure on
user identities without having to manage them in the cloud. which to build secure cloud deployments for services delivery.
It supports broad consumer and user-centric federation func- By delivering integrated and optimized security for virtual-
tionality and provides identity awareness and auditable access ized data centers, Virtual Server Protection for VMware
across SOA and Web services deployments. helps ensure that the virtualized environment itself is secure
when applications and services are moved out into the cloud.
IBM Tivoli Security Policy Manager is a powerful data
and application entitlement management solution that equips
organizations with centralized security policy management

5
For more information
To learn more about IBM security solutions for cloud
and SOA environments, please contact your IBM sales
representative or IBM Business Partner, or visit
ibm.com/tivoli/security
© Copyright IBM Corporation 2010

Identity and access management IBM Corporation Software Group


Route 100
services Somers, NY 10589
IBM Identity and Access Management Services can help you U.S.A.
design, implement, deploy and maintain an integrated iden- Produced in the United States of America
tity management system. Such a system can standardize March 2010
access management across platforms for users, devices, appli- All Rights Reserved

cations and business processes, as well as physical security IBM, the IBM logo, ibm.com, and Tivoli are trademarks or
points such as biometric, smart-card and badge readers. registered trademarks of International Business Machines Corporation
in the United States, other countries, or both. If these and other
IBM trademarked terms are marked on their first occurrence in this
Additionally, financing solutions from IBM Global Financing information with a trademark symbol (® or ™), these symbols indicate
can enable effective cash management, protection from tech- U.S. registered or common law trademarks owned by IBM at the time
this information was published. Such trademarks may also be registered
nology obsolescence, improved total cost of ownership and or common law trademarks in other countries. A current list of
return on investment. Also, our Global Asset Recovery IBM trademarks is available on the Web at “Copyright and trademark
Services help address environmental concerns with new, more information” at ibm.com/legal/copytrade.shtml

energy-efficient solutions. For more information on Other company, product and service names may be trademarks or service
IBM Global Financing, visit: ibm.com/financing marks of others.

References in this publication to IBM products and services do not imply


that IBM intends to make them available in all countries in which
IBM operates.

No part of this document may be reproduced or transmitted in any form


without written permission from IBM Corporation.

Product data has been reviewed for accuracy as of the date of initial
publication. Product data is subject to change without notice. Any
statements regarding IBM’s future direction and intent are subject
to change or withdrawal without notice, and represent goals and
objectives only.

THE INFORMATION PROVIDED IN THIS DOCUMENT


IS DISTRIBUTED “AS IS” WITHOUT ANY WARRANTY,
EITHER EXPRESS OR IMPLIED. IBM EXPRESSLY DISCLAIMS
ANY WARRANTIES OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT.
IBM products are warranted according to the terms and conditions of
the agreements (e.g. IBM Customer Agreement, Statement of Limited
Warranty, International Program License Agreement, etc.) under which
they are provided.

The customer is responsible for ensuring compliance with legal


requirements. It is the customer’s sole responsibility to obtain advice of
competent legal counsel as to the identification and interpretation of any
relevant laws and regulatory requirements that may affect the customer’s
business and any actions the customer may need to take to comply with
such laws. IBM does not provide legal advice or represent or warrant that
its services or products will ensure that the customer is in compliance
with any law or regulation.

Please Recycle

TIS14053-USEN-00

You might also like