| |
GDPR |
CBPR |
| Program Characteristics |
Tight-coupling of European member states |
Loose-coupling of APEC member countries |
| Legislative Framework |
Prescriptive, based on a single privacy legislation |
Guidance, accommodating multiple privacy laws |
| Recourse for contravention |
Punitive, with significant penalties |
Negotiated, with local agreements for redress |
For the past 5 years cloud services have grown to be ubiquitous, secure and high-performance. Yet just yesterday I was talking to a friend who was lamenting the decision he had to make at work regarding deploying a Microsoft Project server on AWS or Azure. He needed to provide access to team members from two organisations and his company would not allow external people to access their on-premise project server. The cloud is the only way to go for such an application. But while that's so obvious there are some caveats that need to be observed.
It's important that my friend select a cloud service provider (CSP) appropriately. He needs to evaluate prospective suppliers from a operational risk viewpoint - can you get your files back when you part ways with the CSP, technical viewpoint - does the CSP provide adequate security and a legal point of view - are the licence terms suitable?
Then a decision needs to be made on the identity service to authenticate users to the site. Is an access control list going to be maintained on the CSP's site (bad), will there be a synchonisation to AD (not much better) or will the company establish an identity provider service in the Cloud? In this instance a cloud-based federation service to which the other company can interface would be a good idea.
The technolgy is here folks - let's just use it.
Thx.
Graham
There is little doubt that identity management is undertaking its biggest transition since its inception 35 years ago. The main drivers of this phenomenon are: cloud technology and the proliferation of smartphones.
The old regime was characterised by a "prohibition" focus with access control based on restricting access unless it was specifically permitted. The guiding policy was the "principle of least privileges" whereby newly hired staff were given accounts the that were basically useless, with access to the the mail system and little else.
Many spent their first few days at work getting access to the applications required for them to perform their jobs; a great waste of time and money.
The new order is characterised by developing trust relationships, and it is supported by compelling arguments. Most organisations have gone as far as they can with their existing the identity validation facilities. As access requirements extend to contractors, business partners and customers, a new paradigm is required: trust placed in external identity provider services for the authentication of users accessing protected resources.
Already most of us have Google Ids or LinkedIn profiles that serve to identify us sufficiently for most online requirements. It makes no sense for a business wanting to sell me something, or a government wanting to provide a service, not to trust my GoogleId for this purpose. They don't need to go to the expense of deploying a website to collect my details, vetting them for accuracy, and managing my details in accordance with legislation. This is expensive and not necessary.
While the Gov-online initiative in the US has struck a rough patch with funding restrictions the UK Verify program in the UK is overcoming its detractors an is a good example of how trust in IDPs is becoming mainstream. Australia has softly announced GovPass as the vehicle for government access management at the Federal level and CIDN in Queensland, Service NSW and ServiceVictoria are gaining traction.
Watch this space.
Graham
One of the fastest growing applications these days is SharePoint. There are several reasons for this:
- It provides an easy-to-use document repository
- It provides a collaboration tool for teams to use
- It provides a central communications portal that reflects the a company’s organisation structure
So what’s the problem?