17
The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. Intelligent Workload Management ©2011 Deloitte Touche Tohmatsu India Private Limited Private and Confidential Management November 2011 Enterprise Risk Services Shree Parthasarathy & Wg Cdr (Retd) Vinay Puri

Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Embed Size (px)

Citation preview

Page 1: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

Intelligent Workload

Management

©2011 Deloitte Touche Tohmatsu India Private LimitedPrivate and Confidential

Management

November 2011

Enterprise Risk Services

Shree Parthasarathy & Wg Cdr (Retd) Vinay Puri

Page 2: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Table of Content

Background

The Need For IWMS

1

2

3 Opportunities and Challenges

© 2009 Deloitte Touche Tohmatsu

4 The Future

Page 3: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Background

© 2009 Deloitte Touche TohmatsuPrivate and Confidential

Page 4: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Intelligent Workload Management - Definition

“IWM” is the means for keeping consumption of computing resources

efficient whilst still making sure business tasks are supported by all the resources

© 2011 Deloitte Touche Tohmatsu India Private LimitedDeloitte4

tasks are supported by all the resources they need and that this is all done

securely

Page 5: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Background

Mobile Device Security

Application Security

Telecom Security

© 2011 Deloitte Touche Tohmatsu Limited5 Deloitte PowerPoint timesaver – November 2011

Infrastructure Security

Wireless Security

Security

Page 6: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Background: Intelligent Workload Management System

Latest Trends

Virtualization

Over a period of time,

processing power is seen as

utility that clients pay for as

required. The main reason

for industry to move towards

virtualization is to reap the

benefits of centralized

administrative tasks by

Cloud Computing

Cloud Computing provides

majority of the services to

clients/end-users with end-

user having no knowledge

or realization about where

actually the data, software

or storage is taking place.

Most cloud computing

Software as a Service

One of the Cloud Application

Service which has become

very popular of late. Cloud

application service delivers

software as a service over

the internet.. SaaS

eliminates the need to

deploy the application at the

© 2011 Deloitte Touche Tohmatsu India Private Limited

administrative tasks by

improving workloads and

scalability. Kind of

virtualization includes:

� Hardware Virtualization

� Software Virtualization

� Desktop Virtualization

� Memory Virtualization

� Storage Virtualization

� Data Virtualization

� Network Virtualization

Most cloud computing

infrastructures consists of

services delivered through

shared data-centers. There

are various deployment

models which includes :

� Public Cloud

� Community Cloud

� Hybrid Cloud

� Private Cloud

deploy the application at the

customers own computers.

SaaS is more popular than a

Infrastructure as a service or

platform as a service.

Page 7: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Challenges: Major Need For Intelligent Workload Management System

IWM tools support the building, management, monitoring and securing of

workloads.

MobilityApplications

© 2011 Deloitte Touche Tohmatsu India Private Limited

Virtualization

VISIBLE STORM IN DATACENTER

Cloud Services

Page 8: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Challenges: Major Need For Intelligent Workload Management System

Is There Any Other Way

Reporting and

Analysis

Access Control

Identity

© 2011 Deloitte Touche Tohmatsu India Private Limited

IWMApplication Packaging

Application Development

Workload

Provisioning

Software Appliances

OPEX and CAPEX

Page 9: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

• There is a visible storm at Data Centers.• Workload Management becoming very complex.

• Managers are nothing but human beings . Theyare not in stage of convincing themselves to be providers of “Satisfactory Services to Clients”.

• Varying industry specific requirements are not met.• Heightened concerns about security and impact

on brand.• Increasing scrutiny from regulators

• Workload Management becoming very complex.• Increasing scrutiny from individual customers and

business partners• Liability for breaches / violations being formalized in

business agreements• Varying security standards being required

• Brand impact from security breach or service disruption.• Multitier applications increase operational

Summary: Challenges

Combinations of following forces demands more automated , better

policy driven systems which can be customized as per organizational

needs

©2011 Deloitte Touche Tohmatsu India Private LimitedPrivate and Confidential

• More enforcement actions anticipated complexity .

• Complexities involved in Sustenance of secure management of Software as a Service .

• Increasing risk & liability associated with breaches• Anticipation of system disruptions and interruption in

business operations.• Migration and auditing services is a big challenge.• Access Control capabilities posses a great

challenge.

• Workload Management becoming very complex.

• On demand computing an various hosted applications complicate IT operations.

• Varying policies demand different access-controls, automation of procedures and no standardization.

• Heightened awareness and concerns about security and privacy.

• Identity Management is a big concern.

• Varying security standards being required.

Datacenters Virtualization

SaaS Cloud Services

4

Page 10: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Intelligent Workload Management: Security Concerns

Security is topmost Concern in the Cloud.

Source: Information Week Analytics Cloud Computing Survey-Fall2008

© 2011 Deloitte Touche Tohmatsu Limited10

Source: 12/2009 Gartner Datacenter Conference PollWeighted scores:

1st priority = 3

2nd priority = 2

3rd priority = 1

Page 11: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Intelligent Workload Management: Identity Concerns

The cross-border nature of cloud computing complicates the control over data location and

therefore the compliance with local legal requirements. Deloitte recommends, it is important

for cloud users to request evidence from service providers of their compliance with prevailing

regulations. Knowledge of risk due to identity concerns in the cloud is very important.

Scenario

Of late technological advantages facilitates various service providers to amalgamate their

efforts to address broader business space. Generally, consumers hold multiple accounts with

the service providers like GMAIL, eBay, etc. Identity has to be verified against central

trusted policy assumed by the system. Therefore, much is at the stake if identities are not

© 2011 Deloitte Touche Tohmatsu Limited

trusted policy assumed by the system. Therefore, much is at the stake if identities are not

handled with extreme precautions. Such scenarios are very common to high end

applications hosted on cloud computing environment. Therefore, identity management also

take top most priority in the whole area of cloud security.

“... leaders at all levels of government and industry need to be able to

make business and investment decisions based on knowledge of risks

and potential impacts.”

Cyberspace Policy Review, February 2009

Page 12: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Intelligent Workload Management: Addressing Concerns

What makes Workload Intelligent

• Policy-driven: IWM enables self –regulation and management according to business policy. It understands its security protocols and processing requirements. Automated support for routine patch management activities which compliments security as pro-active component

• Identity and Security Concerns: Both the concerns are well addressed in workload identity and access controls move with the workload between environments. Built-in log management and compliance reporting capabilities, real-time event tracking, monitoring and alerting makes it very intelligent

• Integrated: Workload works with new management framework which takes care the business needs very well

© 2011 Deloitte Touche Tohmatsu Limited

very well

• Optimized Performance: Workload finds alternatives when computing capacity is required to optimize performance. Workload would track virtualized resources and would reclaim and reassign when the workload is no longer active. In peak hours, additional instances of a workload may need to be deployed quickly

Page 13: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Intelligent Workload Management: Addressing Concerns

Identity and Access Management ( IAM) and security information and event management (SIEM) are often used in conjunction with one another to address security as well as identity concerns. Workload addresses this specific concern by

� Logging, tracking, and monitoring are critical functions for cloud environments. Of late either IAM products have started to offer reporting and logging to achieve integrated security or IAM vendors have partnered with security vendors.

� These components can be used to track sensitive information in or out of the cloud to address the vital issue of cloud users “ what goes out of cloud” . These functions allow to introduce the Forensics

© 2011 Deloitte Touche Tohmatsu Limited

vital issue of cloud users “ what goes out of cloud” . These functions allow to introduce the Forensics capability in the cloud.

� These kind of capabilities also serve to make cloud providers more accountable . Capability of the data movement between virtual machines will also be available.

� Security is further enhanced in the cloud by implementing proven mechanisms such as SSL VPN and strong authentication technologies.

Page 14: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Intelligent Workload Management System

IWMS is not only a vision but ambition for IT industry which will gradually become successful , mature as well as flexible model for IT Managers. This emerging trend will address the typical and complex requirements by integrating various technologies:

Identity and Access Management

To support growing number ofusers form various IT firms tohave the access to variety ofenterprise applications,concerns related Identity andAccess management

Security Management

SIEM solutions are often required to be used in conjunction with Identity and Access Management for strict adherence to security as well as

Policy Based Automation

Service level or policy based automation policies are highly desired to achieve Standardization in the cloud or virtualized environment.

© 2011 Deloitte Touche Tohmatsu Limited

Access managementtechnologies take a lead . Hence,these technologies become veryimp element of IWM.

adherence to security as well as compliance issues which have become more complex with cloud services & virtualization.

virtualized environment.

Monitoring and Analysis

Regulatory compliances demand the monitoring and analysis technologies. This technology is another important component while addressing IWM. Very important during investigations and Forensics analysis.

Software Appliances

Ideally speaking workloads must be portable as well as easily moved across resources as needed. Hence, Intelligent Workload Management is strongly desired by incorporating Software Appliances.

Configuration Management and Performance

Complexities involved while addressing virtualization as well as cloud services requires continuous Configuration Management as well as performance statistics. Dynamic Configuration Changes needs to be analyzed vis-à-vis

performance.

Page 15: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Vision – Intelligent Workload Management System

Vision is to look for intelligent automated solution which brings bundled unit in a secure form irrespective of whether it is deployed onto physical, virtual or cloud infrastructure which can further be easily managed or monitored with automated controls.

Operating Systems

Physical Deployed

System Environment Assurance Solution

© 2011 Deloitte Touche Tohmatsu Limited15

Applications Cloud Secured

Middleware VirtualManaged

Or Monitored

Intelligent

Workload

Management System

Page 16: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

Future of Intelligent Workload Management System

• Presently, some models exist in the form of software appliances. However, as more and more industrial units move into virtualization and utilize cloud services, there is expected surmounting pressure of adoption of policy –based workload management system and reliable identity management capabilities .

• Besides, IWM is an ambitious vision and over a period of time Enterprises are wise to consider how these automation and security investment can be utilized in the form of Intelligent Workload management system.

• In future, combination of automation and security are going to be key to success for any IT driven or dependent organization. IWM will not only reduce cost of operations but will also protect the enterprise’s information assets.

• Growing interest in cloud and Software as a Service extends the boundaries of the datacenter and

© 2011 Deloitte Touche Tohmatsu Limited

• Growing interest in cloud and Software as a Service extends the boundaries of the datacenter and puts tremendous pressure on IT teams to provide reliable solution. Hence, IWM incorporating best technologies will be optimum solution for sure.

• Gartner estimates that the current market for cloud services accounts for approximately R348 billion globally and that it will reach R1125.75 billion by 2013 which also means there will be significant growth in Intelligent Workload Management System.

16

Page 17: Intelligent Workload Management Workload Management: Identity Concerns The cross-border nature of cloud computing complicates the control over data location and therefore the compliance

©2011 Deloitte Touche Tohmatsu India Private LimitedPrivate and Confidential

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms.

This material and the information contained herein prepared by Deloitte Touche Tohmatsu India Private Limited (DTTIPL) is intended to provide general information on a particular subject or subjects and is not an exhaustive treatment of such subject(s) and accordingly is not intended to constitute professional advice or services. The information is not intended to be relied upon as the sole basis for any decision which may affect you or your business. Before making any decision or taking any action that might affect your personal finances or business, you should consult a qualified professional adviser. None of DTTIPL, Deloitte Touche Tohmatsu Limited, its member firms, or its and their affiliates shall be responsible for any loss whatsoever sustained by any person who relies on this material.

©2011 Deloitte Touche Tohmatsu India Private Limited.

Member of Deloitte Touche Tohmatsu Limited

Shree Parthasarathy & Wg Cdr (Retd) Vinay PuriEmail/Contact : [email protected]