Service Oriented Architecture (SOA) is making a name for itself, but identity management services that could make such systems secure are yet to be built. Service Oriented Architecture (SOA) has begun to capture the imagination of both businessmen and IT Departments. A combination of advances in software technology and standardization, that goes by the name of SOA, is making it possible to build business applications by assembling parts of other applications. The development process is fast and thus if an organization chooses to build the right business applications, the benefits come quickly.As its name suggests, this approach to software building is indeed an architecture and implementing SOA foundations is neither a trivial nor simple matter. Nevertheless the IT industry is now thoroughly committed to this approach and we can expect most organizations to adopt it in time. It is important, therefore, to have an understanding of what it will mean.This is particularly the case as regards IT security. SOA presents a more complex scenario than what went before. Previously, companies built or bought applications and secure access to applications was simply a matter of linking valid users to the applications; providing local access rights, authentication and authorization. SOA is about threading multiple applications together, but only using the functionality you need. To achieve this, SOA abstracts the business functionality of specific applications allowing them to be discovered and used by other applications.Unfortunately, this presents an IT security problem. In most organizations some of the business applications involved in any SOA-based application will have different identity mechanisms and security policies. Users will most likley have different privileges for different applications, and thus they will need to be authenticated for each of the applications that are used by the SOA application. The problem is exacerbated by the way that SOA works. Linking between applications occurs through an abstraction layer that does not provide access to local user identity validation in the applications that are accessed – unless the application itself provides such access, which is unlikely to be the case.To consider a simple example, a SOA application might access an order entry capability within the order entry system, but the order entry system is unlikely to know whether the connecting application is authorized and has no means of directly checking it. The underlying problem is that even when organizations have implemented fairly comprehensive access security, it is fragmented. To provide IT security for SOA requires an end-to-end Identity Management capability one that is able to determine access rights for every application involved. Ultimately this means every application that the business runs. Even organizations that have invested heavily in Identity Management will still be some way from achieving that.It follows that IT Security will probably act as a brake on SOA implementations. IT security has often been an afterthought in the implementation of new technology. In recent years, for example, we have witnessed Internet capabilities and wireless capabilities being delivered with inadequate security, often with woeful consequences. Businesses are less likely to be so carefree with SOA, not just because IT security issues are better appreciated, but because SOA will link together the most important systems that organizations run.In the long term, SOA will connect systems between multiple organizations up and down supply chains. When that happens, the IT security situation becomes even more complex and more problematic. Businesses will not only need to have their own IT Security act in order. They will also need to have confidence in the Identity Management infrastucture of suppliers and customers. The commercial motivation to build such SOA capabilities to streamline the supply chain is there. But the Identity Management services that could make such systems secure are yet to be built. Related content news Okta launches Cybersecurity Workforce Development Initiative New philanthropic and educational grants aim to advance inclusive pathways into cybersecurity and technology careers. By Michael Hill Oct 04, 2023 3 mins IT Skills Careers Security news New critical AI vulnerabilities in TorchServe put thousands of AI models at risk The vulnerabilities can completely compromise the AI infrastructure of the world’s biggest businesses, Oligo Security said. By Shweta Sharma Oct 04, 2023 4 mins Vulnerabilities news ChatGPT “not a reliable” tool for detecting vulnerabilities in developed code NCC Group report claims machine learning models show strong promise in detecting novel zero-day attacks. By Michael Hill Oct 04, 2023 3 mins DevSecOps Generative AI Vulnerabilities news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe