How Can Federal Agencies Secure Data Services in the Cloud

Axiomatics Federal, Inc., the leader in fine-grained dynamic authorization for customers and partners of the federal government, was recognized with a Platinum Award in American Security Today's 2018 ‘ASTORS’ Homeland Security Awards Program.

By Gerry Gebel, VP of Business Development at Axiomatics

As businesses continue their mass migration of data, applications, workflows and other business assets to the cloud, federal agencies are following suit, and for a good reason.

By utilizing the cloud, federal agencies minimize their overall IT costs, while increasing scalability, modernizing their IT infrastructure and enabling collaboration among development teams to help solve complex challenges.

In addition, cloud platforms like AWS and Microsoft Azure offer easier, more affordable and flexible data storage systems compared to traditional storage solutions like on-premise relational databases.

There are many advantages of cloud deployments.

However, they do not come without risk. A common challenge is cloud security.

Cloud platforms often include built-in security features like Identity and Access Management (IAM) to help control access to Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) services.

This is where we begin to see limitations in the built-in security features when dealing with, the security of transactions and data in these platforms.

Not to mention, cloud platforms introduce new technology capabilities (such as orchestration) that require IT employees to examine new processes, including security methods.

It is critical to enhance the basic security capabilities of the cloud platform and cloud data service providers to ensure the high levels of access control federal agencies have in their on-premise systems translate to the same fine-grained levels they require in the cloud.

Augmenting Built-In Security Features

Out of the “box”, cloud platforms don’t offer much sophistication for a policy-based approach to both securing and sharing data.

We see new security products are emerging to protect the cloud, but in some cases, these only focus on a single aspect, such as the security of the infrastructure and containers instead of protecting the data itself.

One example is AWS.

AWS has an “IAM” strategy focused on authorizing administrators to spin up/down servers, databases, containers, etc.

Still, the AWS “IAM” strategy is limited because it focuses on the infrastructure instead of the data.

AWS uses the same legacy identity/role/group-based approach to authorization, which is not fine-grained enough to secure critical information federal agencies hold like national security information or personally identifiable information (PII) on American citizens.

Federal agencies require more advanced security measures than what cloud providers offer.

Security controls must address the legal requirements for the proper handling and sharing of sensitive digital information.

The security protocols must also implement access policies consistently across cloud platforms, instead of acquiring the additional risk and cost of cloud platform-specific security tools.

Security tools must also be built and deployed in the cloud, so they can be managed the same way any application workloads are managed.

Implementing Dynamic Authorization to Protect Cloud-Hosted Data

Federal agencies can extend access control capabilities beyond what cloud providers offer with externalized dynamic authorization delivered with Attribute Based Access Control (ABAC).

Dynamic authorization for cloud-hosted data works by leveraging access control and organizational policies to decide what resources can and cannot be accessed.

Federal agencies can access additional context like risk score, device information, location, etc. when deciding on access decisions.

Policies are an exact reflection of federal requirements and are easy to decipher.

(See how your organization can Enable Digital Transformation with Dynamic Authorization. Courtesy of Axiomatics and YouTube.)

With dynamic authorization, federal agencies can define their data access policies once and apply them consistently on-premise and in cloud deployments.

Federal agencies ensure secure access to applications and data in the cloud while also realizing a wide range of other benefits, including:

  • Running an access control service in cloud platforms directly with protected applications and data provides best-in-class system performance.
    • In addition, this approach permits federal agencies to operate the security infrastructure in the same way that applications are managed.
  • Dynamic authorization for cloud platforms saves developers a significant amount of time because application development accommodates the microservice approach of bounded context and calls external services for security functions.
    • Developers are no longer bothered with adding security code to their APIs/microservices. Instead, they can call another microservice to process access decisions.
  • Application maintenance costs are significantly reduced by separating security logic from the application.
    • By moving security logic to a dedicated service, access policy changes are implemented independent of the business logic code, resulting in a much easier/quicker access policy change process.
  • A dedicated dynamic authorization service can respond faster to policy change requests because code changes are eliminated.
    • Instead, policy changes are made in the authorization service through configuration and delivered to the runtime services.

As more federal agencies continue to tap the power of the cloud and migrate their infrastructure to cloud platforms, the need to address complex access control use cases for cloud-based resources is only going to grow.

The federal government houses massive amounts of sensitive data that can threaten the security of millions of citizens.

By leveraging dynamic authorization delivered with ABAC, federal agencies enable secure access to sensitive information assets such as applications and data that are now stored within cloud platforms, as well as the administration of cloud deployments.

About the Author

Gerry Gebel, Vice President of Business Development at Axiomatics
Gerry Gebel, Vice President of Business Development at Axiomatics

Gerry Gebel, Vice President of Business Development at Axiomatics

Gerry is the vice president of business development at Axiomatics.

In this role, Gerry supports the sales, marketing and product teams by managing strategic partnerships and alliances. Before joining Axiomatics, Gerry was vice president and service director for Burton Group’s identity management practice.

He covered topics such as authorization, federation, identity and access governance, user provisioning and other IAM topics.

Gerry has more than 15 years of experience in the financial services industry, focusing on security architecture, middleware support and mainframe systems.

Gerry can be reached as follows: Twitter: https://twitter.com/ggebel?lang=en LinkedIn: https://www.linkedin.com/in/gerry-gebel-626332/

Axiomatics Federal, Inc., the leader in fine-grained dynamic authorization for customers and partners of the federal government, was recognized in American Security Today’s 2018 ‘ASTORS’ Homeland Security Awards Program.

Axiomatics Federal, Inc. received the Platinum Award in the ‘Innovative Access and Authentication System Solutions’ category.

Craig Gilley, President, Axiomatics Federal accepting a 2018 'ASTORS' Platinum Award at ISC East
Craig Gilley, President, Axiomatics Federal accepting a 2018 ‘ASTORS’ Platinum Award at ISC East

“Since IT environments are becoming increasingly complicated, federal agencies, like the Department of Homeland Security, are finding new ways to manage their complex and changing access control needs,” said Craig Gilley, president of Axiomatics Federal, Inc.

“The Axiomatics Policy Server does just that.”

“This award establishes the Axiomatics Policy Server as the go-to dynamic authorization solution for Federal agencies and I couldn’t be prouder of this accomplishment.”

Dynamic Authorization solutions from Axiomatics enable accelerated digital transformation, greater business agility and responsiveness, effective governance, and an improved customer experience:

  • Centrally-managed, policy-based approach to managing authorization
  • Reduction in time spent managing authorization
  • Reduction in time spent onboarding new users, and have access evolve over time
  • Reuse authorization policies across other IT environments
  • Enable centralized audit reporting

Axiomatics Takes Platinum in the 2018 ‘ASTORS’ Homeland Security Awards Program

Axiomatics Federal Inc.

2018 ASTORS Platinum

  • Best Best IT Policy Mgmt & Authentication

  • Axiomatics Policy Server

The Annual ‘ASTORS’ Awards Program is specifically designed to honor distinguished government and vendor solutions that deliver enhanced value, benefit and intelligence to end users in a variety of government, homeland security and public safety vertical markets.

William "Bill" Bratton, former police commissioner of the New York Police Department (NYPD), the Boston Police Department (BPD) and former chief of the Los Angeles Police Department (LAPD), will speak at the 2019 'ASTORS' Homeland Security Awards Luncheon at ISC East 2019, on Wednesday, November 20th, at the Jacob Javits Convention Center (Courtesy of Teneo Risk)
Bill Bratton, former police commissioner of the New York Police Department (NYPD), the Boston Police Department (BPD) and former chief of the Los Angeles Police Department (LAPD), will speak at the 2019 ‘ASTORS’ Homeland Security Awards Luncheon at ISC East 2019, on Wednesday, November 20th, at the Jacob Javits Convention Center (Courtesy of Teneo Risk)

The 2018 ‘ASTORS’ Awards Program drew an overwhelming response from industry leaders with a record high number of corporate and government nominations received, as well as record breaking ‘ASTORS’ Presentation Luncheon Attendees, with top firms trying to register for the exclusive high – end luncheon and networking opportunity – right up to the event kickoff on Wednesday afternoon, at the ISC East registration!

Over 130 distinguished guests representing National, State and Local Governments, and Industry Leading Corporate Firms, gathered from across North America, Europe and the Middle East to be honored among their peers in their respective fields which included:

  • The Department of Homeland Security
  • The Federal Protective Service (FPS)
  • Argonne National Laboratory
  • The Department of Homeland Security
  • The Department of Justice
  • The Security Exchange Commission Office of Personnel Management
  • U.S. Customs and Border Protection
  • Viasat, Hanwha Techwin, Lenel, Konica Minolta Business Solutions, Verint, Canon U.S.A., BriefCam, Pivot3, Milestone Systems, Allied Universal, Ameristar Perimeter Security and More!

The Annual ‘ASTORS’ Awards is the preeminent U.S. Homeland Security Awards Program highlighting the most cutting-edge and forward-thinking security solutions coming onto the market today, to ensure our readers have the information they need to stay ahead of the competition, and keep our Nation safe – one facility, street, and city at a time.

2018 'ASTORS' Homeland Security Awards Luncheon at ISC East
2018 ‘ASTORS’ Homeland Security Awards Luncheon at ISC East

The 2018 ‘ASTORS’ Homeland Security Awards Program was Proudly Sponsored by ATI SystemsAttivo NetworksAutomatic SystemsDesktop Alertand Royal Holdings Technologies.

2018 Champions Edition

See the 2018 ‘ASTORS’ Champions Edition – ‘Best Products of 2018 ‘ Year in Review’ for in-depth coverage of the outstanding products and services of firms receiving American Security Today’s 2018‘ASTORS’ Homeland Security Awards.’

Nominations for the AST 2019 ‘ASTORS’ Homeland Security Awards Program will officially open as of January 1st, 2019 at americansecuritytoday.com.

Enter Early to Maximize Media Coverage of your Products and Services at Kickoff, and Get the Recognition Your Organization Deserves!

And be sure to Register Early for the 2019 ‘ASTORS’ Awards Presentation Luncheon at ISC East 2019 to ensure your place at this limited- space event!

2018 'ASTORS' Homeland Security Awards Luncheon at ISC East
2018 ‘ASTORS’ Homeland Security Awards Luncheon at ISC East

Why the 2018 ‘ASTORS’ Homeland Security Awards Program?

American Security Today’s comprehensive Annual Homeland Security Awards Program is organized to recognize the most distinguished vendors of physical, IT, port security, law enforcement, and first responders, in acknowledgment of their outstanding efforts to ‘Keep our Nation Secure, One City at a Time.’

Why American Security Today?

American Security Today is uniquely focused on the broader Homeland Security & Public Safety marketplace with over 70,000 readers at the Federal, State and local levels of government as well as firms allied to government.

The old traditional security marketplace has been covered by a host of security publications that have changed little over many years.

American Security Today brings forward a fresh compelling look and read with our customized digital publications that provides our readers with solutions to their challenges.

Our Editorial staff provides a full plate of topics for our AST monthly digital editions, AST Website and AST Daily News Alerts.

The editorial calendar and AST’s high drawing website features 23 different Technology and Marketing Sectors such as Access Control, Perimeter Protection, Video Surveillance/Analytics, Airport Security, Border Security, CBRNE Detection, Border Security, Ports, Cybersecurity, Networking Security, Encryption, Law Enforcement, First Responders, Campus Security, Security Services, Corporate Facilities and Emergency Response among others.

These sectors are part of the new integration, where these major applications communicate with one another in a variety of solutions to protect our cities and critical infrastructure.

AST has Expanded readership into vital Critical Infrastructure audiences such as Protection of Nuclear Facilities, Water Plants & Dams, Bridges & Tunnels, and other Potential targets of terrorism.

Other areas of concern include Transportation Hubs, Public Assemblies, Government Facilities, Sporting & Concert Stadiums, our Nation’s Schools & Universities, and Commercial Business Destinations – enticing targets for extremist or lone wolf attacks due to the large number of persons and resources clustered together.

Axiomatics logoUnified Dynamic Authorization ensures the right access, to the right assets, at the right time.

Providing the visibility and control you need to secure your business.

To Learn More, please visit https://www.axiomatics.com/.