By The Enterprise Web 2.0 Blog | Article Rating: |
|
March 13, 2008 11:45 AM EDT | Reads: |
449 |
So this got me thinking on the unsexy-but-critical topic of mashup security. We have posted in the past about ‘Confidence’ and ‘Governance’, but these have generally been non-specific. So let me try to get a bit practical. The question isn’t a simple one but it is certainly worth noodling: How do we execute mashups safely in the context of the enterprise? I think we are all aware of the security landscape today. On the technology level alone, security is a messy word of old and new systems that do or do not have any connection to corporate monitoring, authentication, authorization, and logging solutions. And it gets even more complicated once you add the ever-changing set of mandated and self-imposed privacy and data control policies and regulations. You can begin to understand why Enterprise Security Architects don’t get much sleep. Mashups must play nicely in this complicated security ecosystem. For the sake of this discussion, let’s use this working definition of a mashup: ‘an enterprise mashup is a user-driven micro-integration of internal and external data’. From this definition, we can extract the following important security meta-requirements: Generally, meeting these meta-requirements can get very complicated very quickly. But it can’t be done as an afterthought! You must be proactive and persistent. Based on these meta-requirements, I’d propose the following Enterprise Mashup Security Guidelines. Enterprise Mashups have the potential to be the technology equivalent of the Wild West. Follow the Guidelines and you’ve got yourself a sheriff. Ignore the Guidelines and you could get yourself some quality time in the pokey.
Read the original blog entry...
Published March 13, 2008 Reads 449
Copyright © 2008 Ulitzer, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
- Where Are RIA Technologies Headed in 2008?
- How and Why AJAX, Not Java, Became the Favored Technology for Rich Internet Applications
- i-Technology 2008 Predictions: Where's RIAs, AJAX, SOA and Virtualization Headed in 2008?
- AJAX, RIA, Rich Web Technologies and iPhone Developer Summit Call for Papers Deadline January 25, 2008
- Steve Jobs Dismisses Java As "Heavyweight" in an Age of Lightweight Computing
- Sun Blew its "iPhone" Java Opportunity to AJAX
- Building an iPhone Application with Adobe AIR
- iPhone Will Make Mobile AJAX and Web 2.0 Happen
- Backbase to Deliver the First AJAX SDK for Apple's iPhone
- Twelve New Programming Languages: Is Cloud Responsible?