1 Key Management Interoperability Protocol (KMIP) Bob Griffin co-chair, KMIP TC www.oasis-open.org.

Slides:



Advertisements
Similar presentations
Government and Cloud The current thinking on the technical architecture for the UK government’s proposed G-Cloud and App Store Kate Craig-Wood CEO, Memset.
Advertisements

Azure AD & Office Logon with Username / Password 2. MFA challenge 3. Reply to MFA challenge -1-way or 2-way SMS -Phone call -Mobile Application.
Key Wrapping in KMIP Mark Joseph, P6R Inc 2/27/2015.
What does an IT Decision Maker need to make a decision? Dashboard and on-demand reporting: usage and performance on assigned clouds, your workloads, infrastructure.
© 2009 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice KMIP Key Naming for Removable Media.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Key Management Interoperability Protocol By: Derrick Erickson.
IPhone SDK and Enterprise Peter Wood. Enterprise Upcoming iPhone support for Microsoft Exchange ActiveSync and industry-standard corporate security measures.
Key learnings from our customers Data privacy is important and is often mandated Regulatory requirements are on the rise IT must ‘reason over data’
KMIP Use Cases Update on the process. Agenda Goals Process Flow, Atomics, Batch, Composites, and Not KMIP Evaluating the Document in light of the Goals.
Accelerate adoption, provide customer insights to engineering, and deliver knowledge to the IT Pro community.
Building enterprise social into your environment
Cost Effort Complexity Benefit Cloud Hosted Low Cost Agile Integrated Fully Supported.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Illustration Assets for KMIP Use Case Document. Users.
KMIP Cloud Use Case Kiran Thota – VMware Inc. Saikat Saha – Oracle Corp.
1 NETE4631 Mobile Cloud Computing Lecture Notes #10.
THE DICOM 2013 INTERNATIONAL CONFERENCE & SEMINAR March 14-16Bangalore, India Creating & Managing Data Sets for Adv. Visualization Testing Björn Nolte.
©2012 Microsoft Corporation. All rights reserved..
KMIP - Hardware Security Modules Meta-Data-Only (MDO) Keys Saikat Saha & Denis Pochuev Feb 2012.
In the name of God :).
Bob: Hello and welcome to this webinar on the OASIS Key Management Interoperability Protocol., or KMIP. My name is Bob Griffin, Chief.
HSM Management Use-case Summary KMIP F2F Sep 2012 Denis Pochuev
Microsoft Virtual Academy.
THE LATEST TOP 10 STRATEGIC TECHNOLOGY TRENDS Chris Shayan, Software Solution Architect, Pyramid Consulting According to Gartner Report.
1 The OASIS KMIP Standard: Interoperability for the Cryptographic Ecosystem Jon Geater OASIS KMIP TC With thanks to Bob Griffin, co-chair,
Group Kiran Thota, VMware Saikat Saha, Oracle. What is Group? Group can be defined as a logical collection or container of objects – Managed Objects –
Overview Privacy Management Reference Model and Methodology (PMRM) John Sabo Co-Chair, PMRM TC.
Major Features of iMenuToGo Mobile App for Ordering Works with ANY Smart Phone App is Available on the App Store (Apple, for a fee) App is Available on.
consumerization of IT new social & app patterns cloud computing data explosion.
L ASER A PP C ONFERENCE 2015 CRM for Wealth Management.
July, 2012 Citrix CloudGateway™ Technical Overview.
Mobile App Application Code Kony Sync Lib Device DB Kony JS SDK SKY client App Server SKY DB KonySync Server Enterprise Data SKY Gateway Sky Server/SAP.
By Umair Ali. Dec 2004Version 1 -PKI - a security architecture – over the internet. -Provides an increased level of confidence for exchanging information.
1 NIST Key State Models SP Part 1SP (Draft)
Objective: Enable portability and semi-automatic management of applications across clouds regardless of provider platform or infrastructure thus expanding.
Cloud of Clouds for UK public sector. Cloud Services Integrator.
Manage your cloud with Citrix CloudPortal Services Manager 10 Jared Engskow Senior Technical Readiness Specialist May 8, 2010.
 Mike Martin  Architect  MEET Member  Crew Member of Azug  Windows Azure Insider  Windows Azure MVP  
Bob: Hello and welcome to this webinar on the OASIS Key Management Interoperability Protocol., or KMIP. My name is Bob Griffin, Chief.
KMIP - Hardware Security Modules Meta-Data-Only (MDO) Keys Saikat Saha & Denis Pochuev Feb 2012.
Security Considerations
| Lausanne Become an Office 365 developer in 60 min Valerie Alonso Xavier Bocken.
CIA AAA. C I A Confidentiality I A Confidentiality Integrity A.
ALL INFORMATION PRESENTED AS WELL AS ALL SESSIONS ARE MICROSOFT CONFIDENTIAL AND UNDER YOUR NON-DISCLOSURE AGREEMENT (NDA) AND\OR TECHNOLOGY PREVIEW.
KMIP Compliance Redefining Server and Client requirements to claim compliance Presented by: Bob Lockhart.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
WHO’S WHO IN “CLOUD”? PHIL WORMS DIRECTOR MARKETING IOMART GROUP.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Karla Marvin, Program Manager Vendor Solutions Symposium December 2012 New Models of Care (NMOC) Mobile Applications.
Productivity Architect Meet Chris Bortlik Author, Blogger, Speaker.
Existing Applications Applications built on SDK
VIDIZMO SharePoint App
KMIP Key Management with Vormetric Data Security Manager
Enterprise Key Management with OASIS KMIP
Enabling Encryption for Data at Rest
Enabling Encryption for Data at Rest
Organization for the Advancement of Structured Information Standards
Server Side Wrap Operations
ASP.NET Core 2.0 Identity and Azure Active Directory
STORE MANAGER RESPONSIBILITIES.
RSA 2019 Interop Demonstration Event
OASIS Booth Presentations for the RSA Conference
OASIS KMIP & PKCS#11 Booth (RSA 2018) - Presentations
Electronic Payment Security Technologies
The only tool you need to manage your properties
Presentation transcript:

1 Key Management Interoperability Protocol (KMIP) Bob Griffin co-chair, KMIP TC

Prior to KMIP each application had to support each vendor protocol

With KMIP each application only requires support for one protocol

Prior to KMIP each application had to integrate each vendor SDK

With KMIP each application only requires one vendor SDK integration

Private Cloud Cloud Service Provider KMIP in the Cloud Confidential Enterprise B Tenant keys stored and managed in private cloud Tenant app at CSP requests keys KMS Tenant A app Tenant B app Enterprise A Admin CSP Admin KMIP

Private Cloud Cloud Service Provider 7 Confidential Enterprise B Tenant keys stored and managed in private cloud Tenant KMS at CSP receives keys Tenant app at CSP requests keys KMS Tenant A app Tenant B app Enterprise A Admin CSP Admin KMS AKMS B KMIP in the Cloud - 2 KMIP

Private Cloud Cloud Service Provider KMIP in the Cloud Confidential Enterprise B Tenant keys stored and managed in public cloud as shared service Tenant app at CSP requests keys Tenant A app Tenant B app Enterprise A Admin CSP Admin CSP KMS KMIP