40
Jim Scharf @jim_scharf 7/22/2014 Identity Management in the AWS Cloud

CIS14: Identity Management for the Cloud

Embed Size (px)

DESCRIPTION

Jim Scharf, Amazon What’s different in providing identity and access management for one of the largest cloud providers, some of the key technology and design decisions made along the way, and how AWS is working to make it even easier to federate with existing social and enterprise identity providers.

Citation preview

Page 1: CIS14: Identity Management for the Cloud

Jim Scharf @jim_scharf 7/22/2014

Identity Management in the AWS Cloud

Page 2: CIS14: Identity Management for the Cloud

Introductions

Jim Scharf General Manager, AWS Identity and Access Management Joined AWS in 2004

Page 3: CIS14: Identity Management for the Cloud

Agenda

Identity Requirements For: Infrastructure Services Platform Services Enterprise Applications Mobile Internet of Things

Challenges

Page 4: CIS14: Identity Management for the Cloud

AWS Overview

Page 5: CIS14: Identity Management for the Cloud

Infrastructure

Foundation Services

Regions Availability Zones

Storage (Object, Block and Archive)

Networking Security & Access Control

Platform Services

Databases

Relational

NoSQL

Caching

Analytics

Hadoop

Real-time

Data warehouse

App Services

Queuing

Orchestration

App streaming

Transcoding

Email

Search

Deployment & Management

Containers

Dev/ops Tools

Resource Templates

Mobile Services

Identity

Sync

Mobile Analytics

Notifications

Enterprise Applications Virtual Desktops

Data Workflows

Usage Tracking

Monitoring and Logs

Compute (VMs, Auto-scaling and Load Balancing)

CDN and Points of Presence

Collaboration and Sharing

Page 6: CIS14: Identity Management for the Cloud
Page 7: CIS14: Identity Management for the Cloud

Global Availability

10 AWS Regions Worldwide 26 Availability Zones 51 Edge Locations

Page 8: CIS14: Identity Management for the Cloud

Infrastructure Services

Page 9: CIS14: Identity Management for the Cloud

Last Year @CIS…

Discussed things that made AWS Identity and Access Management a bit different from traditional corporate IAM:

–  Scale –  Resources

–  Customers

Page 10: CIS14: Identity Management for the Cloud

AWS Identity and Access Management http://aws.amazon.com/iam

55-min Talk: http://bit.ly/1eZrtbX

Two Minute Overview: http://youtu.be/Ul6FW4UANGc

Page 11: CIS14: Identity Management for the Cloud

The Cloud isn’t an ‘All or Nothing’ Choice

Corporate Data Centers

On-Premises Resources

Cloud Resources

Integration SAML 2.0

Page 12: CIS14: Identity Management for the Cloud

Identity Federation Partners

Page 13: CIS14: Identity Management for the Cloud

Identity Requirements: Infrastructure Services

Infrastructure

Identities IT, DevOps

Scale 1 – 100+

Identity Providers

Cloud Provider, Corporate

Security Controls

Privileged user controls

Admin/ Integration Needs

Federation

Page 14: CIS14: Identity Management for the Cloud

Platform Services

Page 15: CIS14: Identity Management for the Cloud

Elastic Beanstalk OpsWorks CloudFormation

Application Container Application Automation Templated Provisioning

Page 16: CIS14: Identity Management for the Cloud

Identity Requirements: Platform Services

Platform

Identities Developers

Scale 1 – 1,000+

Identity Providers

Cloud Provider, Corporate, Web/Social

Security Controls

Start open, then tighten

Admin/ Integration Needs

Simple programming model

Page 17: CIS14: Identity Management for the Cloud

Enterprise Applications

Page 18: CIS14: Identity Management for the Cloud

Delivering on the promise of desktop virtualization •  Infrastructure & admin tools •  End user desktop and mobile

apps

Fully managed, secure document storage and sharing service for the Enterprise •  Share documents and folders •  Corporate directory integration •  Set user sharing policies •  Audit logs for document and user

activity

Page 19: CIS14: Identity Management for the Cloud

Identity Requirements: Enterprise Applications

Applications

Identities Employees

Scale 10 – 100K+

Identity Providers

Corporate

Security Controls

Enterprise controls,

security, audit

Admin/ Integration Needs

Federation

Page 20: CIS14: Identity Management for the Cloud

Mobile

Page 21: CIS14: Identity Management for the Cloud

Powering Popular Mobile Businesses Today Mobile Startups on AWS Mobile Apps within Enterprises

Page 22: CIS14: Identity Management for the Cloud

Managing Identities Across Devices

Keeping Data in Sync

The Challenge of Multiple Devices

Page 23: CIS14: Identity Management for the Cloud

Amazon Cognito Fully Managed User Identity and Data Synchronization Service

Security Identity Synchronization

+ +

Page 24: CIS14: Identity Management for the Cloud

Manage unique identities

Supports multiple login providers

Amazon Cognito and Identity

Page 25: CIS14: Identity Management for the Cloud

Store app data, preferences & state

Work offline via local data store

Seamlessly sync across devices

Amazon Cognito and Sync

Page 26: CIS14: Identity Management for the Cloud

Implement security best practices

Safeguard AWS credentials

Set granular access permissions on AWS resources

Amazon Cognito and Security

Page 27: CIS14: Identity Management for the Cloud

Fully Integrated AWS Mobile SDK

•  No back-end programming required •  Common authentication mechanism across

all services •  Automatically handle intermittent network

connections •  Cross-platform Support: Android, iOS, Fire

OS •  Secure access to global AWS services

Page 28: CIS14: Identity Management for the Cloud

Identity Requirements: Mobile Apps

Mobile: Enterprise

Mobile: Consumer

Identities Employees Consumers

Scale 10 – 100K+ 1 M – 1B

Identity Providers

Corporate Web/Social

Security Controls

Enterprise controls,

security, audit

Auto per-user isolation

Admin/ Integration Needs

Simple programming

model, Federation

A few lines of client-side

code

Page 29: CIS14: Identity Management for the Cloud

Internet of Things

Page 30: CIS14: Identity Management for the Cloud

Amazon Cognito for Unauthenticated Identities

Unique Identifier for Your “Things” “Headless” connected devices can also securely access cloud services.

Save Data to the Cloud Save app and device data to the cloud and merge them after login

Guest User Access Securely access AWS resources and leverage app features without the need to create an account or logging in

Visitor Preferences

Cognito Store

Guest

EC2 S3 DynamoDB Kinesis

Page 31: CIS14: Identity Management for the Cloud

Identity Requirements: Internet of Things IoT

Identities Devices

Scale 50 B

Identity Providers

Web/Social/Personal?

Security Controls

Varies

Admin/ Integration Needs

Class/attribute based controls

Page 32: CIS14: Identity Management for the Cloud

Recap

Page 33: CIS14: Identity Management for the Cloud

Identities

Developers Employees Consumers Devices IT, DevOps

Page 34: CIS14: Identity Management for the Cloud

IaaS PaaS

SaaS Mobile: Enterprise

Mobile: Consumer

IoT

Time

Scale Id

entit

ies

101

102 103 104

105

106 107 108

109 1010

Page 35: CIS14: Identity Management for the Cloud

Identity Providers

AWS

Web/Social

Corporate

Page 36: CIS14: Identity Management for the Cloud

Security Controls

Page 37: CIS14: Identity Management for the Cloud

Identity Requirements Infrastructure Platform Applications Mobile:

Enterprise Mobile:

Consumer IoT

Identities IT, DevOps Developers Employees Employees Consumers Devices

Scale 1 – 100+ 1 – 1,000+ 10 – 100K+ 10 – 100K+ 1 M – 1B 50 B

Identity Providers

Cloud Provider, Corporate

Cloud Provider,

Corporate, Web/Social

Corporate Corporate Web/Social Web/Social/

Personal?

Security Controls

Privileged user controls

Start open, then tighten

Enterprise controls,

security, audit

Enterprise controls,

security, audit

Auto per-user isolation

Varies

Admin/ Integration Needs

Federation Simple programming

model

Federation Simple programming

model, Federation

A few lines of client-side

code

Class/attribute based

controls

Page 38: CIS14: Identity Management for the Cloud

Challenges

•  Billions of identities •  Millions of authentications/second, latencies ~1ms

•  Becomes a large scale distributed systems challenge

•  Authorizing trillions of resources •  Audit becomes a big data problem •  Global, high-availability system

•  Constant tension of security vs. eventual consistency

Page 39: CIS14: Identity Management for the Cloud

http://reinvent.awsevents.com/

Page 40: CIS14: Identity Management for the Cloud

Thank You

For more information: Website: http://aws.amazon.com/iam AWS Security Blog: http://blogs.aws.amazon.com/security/ Follow: @AWSIdentity