You are here: The Open Group > IT Architecture Practitioners Conference San Diego 2007 > Proceedings
       

Security Forum

Objective of Meeting

  • Review the Security Forum's overall positioning, objectives, and plans for 2007
  • Progress the existing project on developing a Security Forum strategy embracing governance
  • Run the APC Stream 9 on the evolving role of the Security Architect in enterprise architecture
  • Continue engagement in the Identity Management Forum agenda
  • Review in some detail the FAIR proposal on risk management, as a potential new project
  • Pursue with SOA WG our interest in the security aspects of SOA
  • Review proposal to evaluate Jericho Forum requirements

Summary

Introductions & Agenda Review

After a round of introductions, the agenda was approved.

Review Security Forum Current Positioning & Status

Members reviewed a summary of where we are today, and what opportunities we have for improving the value-add of the Security Forum to IT-dependent enterprise businesses. The presentation focused on the first five slides - covering where we are today in our overall Open Group security program, which embraces:

The remainder of the slides in this presentation cover the origins, evolution, achievements, and current projects in the Security Forum. 

One suggested new project is to pull together a Guide for Security Architects to include our work on design patterns, building blocks, views, governance, etc.

Action: Ian will gather existing sources of materials which may contribute to a useful Guide for Security Architects.

Another suggested project not covered as a separate agenda item is an opportunity to engage with the organizers of the "Global Security Challenge" (London Business School), which aims to promote development of innovative security solutions for today's global IT environment, through running a competition where contenders submit proposals for solutions, judged by an expert panel with potential for venture capital support for the winner(s). The benefit to the Security Forum in becoming involved was thought to be minimal, though the beneficial visibility for The Open Group to support organizing this event (in October - the week before The Open Group q407 conference) may be worth investigating. We could look at the impact on enterprise architectures - a message to start-up solutions developers that successful deployment paths are greatly eased if the proposed solution fits into an existing framework. We could see if we can make enterprise architecture a part of the challenge. Maybe we could suggest how to develop solutions beyond just technology (i.e., people and process too). Or participate on a panel - even the panel of judges.

Action: Ian will include in the Security Forum q407 agenda a report on the outcomes (entries, winner, etc.) of the Global Security Challenge.

Security Forum Strategy White Paper

This is an Open Group Security Forum White Paper, prepared in collaboration with the American Bar Association Cyberspace Law Subcommittee on Connectivity, Storage, and Computing Infrastructure Security, and with contributions from The Open Group’s Jericho Forum. It proposes a strategic direction for further new multi-disciplinary projects targeted at advancing the role of the Security Architect in support of delivering better governance. The latest draft of the document is available to members at www.opengroup.org/projects/sec-strategy

Arising from our continuing collaboration with the American Bar Association's cyberlaw group, the visit of our Chair to the ABA Winter Meeting last week resulted in much interest from ABA cyberlaw group members, and an undertaking that a prominent ABA cyberlaw group member will send us a revised draft based on the review in their meeting. 

The Security Forum members took a guided tour through the latest draft of the paper. Comments were mostly observations stimulated from the content but not proposing any additions or modifications, except as follows:

  • Investment is also important in the information, both in its storage and in its availability for use - hence the presentation medium (hardware) and environment is still important.
  • Coherence and commonality is emerging on how governance needs to be practiced.
  • We need security as a property of the IT system, but we also need security of the information, which needs to be both appropriately secure and appropriately accessible.
  • Access should be automatically enforced and only relaxed when built-in exception controls trigger a mechanism to modify it.

Identity Management

The Identity Management Forum meeting was attended by all the Security Forum members, and is reported separately

APC Stream #9 (Wednesday January 31)

The Security Forum organized and hosted this one-day open meeting as a Stream of the Architecture  Practitioners Conference, on the evolving role of the Security Architect in the context of responding to business imperatives, not only for operational security but also for audit and support to demonstrating compliance with applicable regulations. The agenda of presentations, synopses for each presentation, and speaker biographies together with a report on this very informative event are available here. The presentations from this APC Stream #9 are available to members-only here.

Review of FAIR (Factor Analysis for Information Risk)

The Security Forum members received a more detailed description of the core operational features of the FAIR framework, covering risk taxonomy, determining vulnerability, risk posture and risk management capabilities, and the underlying management framework. Risk Management Insight (RMI) believes that risk management is not understood correctly; in CISSP, it is defined as annual loss expectancy.

Members then discussed options for adopting FAIR as a new project and what the benefits would be to each side - the Security Forum on the one hand, and the developers from RMI on the other. RMI's approach is to teach people how to use FAIR and then provide them with the tools to make it work well for them; also their stated goal is to provide the right training, backed by a certification scheme for those who attain proficiency in using it at selected levels. RMI have already developed training courses and an associated certification scheme for successful trainees. Security Forum members wondered about where FAIR fits with TOGAF - perhaps at the early stage where business considerations are gathered.

If the FAIR framework is in the public domain, then it must be free to use. It was confirmed that the framework is zero cost to use, and anyone who wishes to build an implementation is free to do so ... this option is itself an example of risk management. RMI have released the FAIR Framework into the public domain under a "creative commons" license, the intent of which is to ensure that anyone who develops an enhancement is obligated to shared it with the FAIR development community. More information on this and other aspects of FAIR are available at www.riskmanagementinsight.com or at the WIKI site www.fairwiki.riskmanagementinsight.com

 Discussion moved on to consider what the Security Forum would do if we reach mutual agreement to adopt FAIR as a new project:

  • Standardize/normalize terms and definitions in risk management
  • Evolve FAIR in a public way:
    • The Open Group to contribute to evolution
    • Promote, market, adopt
    • Relationship to TOGAF
    • Extend to other areas; e.g.:
      • Disaster/BRP...
      • Project management
      • ABA/legal
      • Auditors
      • Architecture Forum
  • Training and certification are out of scope for the present, but should be revisited at appropriate time in the future
  • Within next six months, build and validate interest (10-20 heavy lifter contributors) of members in the Security Forum and Jericho Forum in supporting development of an open standard for FAIR
  • Get a slot in the July 2007 Austin plenary under "integration of TOGAF with other industry standard bodies of knowledge in the IT field"
  • Track in July 2007 to raise the challenge: existing users, case studies, tutorial, compare with competing approaches
  • Put on agenda for the next Jericho Forum BoM meeting
  • Propose putting presentation on agenda for the next Jericho Forum Members Meeting (March 16, London) - one-hour remote presentation
  • Propose presentation to ABA Spring meeting, under The Open Group liaison arrangement
  • Resolve any procedural issues that may affect The Open Group's ability to proceed with adopting the FAIR Framework by the July 2007 meeting:
    • Creative commons license
  • Mike will draft an email covering this to the Security Forum membership
  • Ian will draft an email covering this to the Jericho Forum membership

Based on this approach, RMI proposed supporting the Security Forum adopting FAIR as a new project, and the Security Forum accepted the proposal, conditional on RMI becoming a member.

Action: Ian will coordinate the proposed program of activities towards building an effective development project for the FAIR framework.

Security Aspects of SOA

The purpose of this joint meeting with the Service Oriented Architecture WG (www.opengroup.org/projects/soa)  was to explore what is different about delivering secure IT operations in an SOA environment. We held an initial discussion in the previous conference (Lisbon, October 2006), so this is a continuation from that exploratory meeting. In Lisbon the Security Forum outlined Jericho Forum issues, including its papers on Inherently Secure Protocols & Architectures for de-perimeterization, to illustrate the different approach that effective security solutions in distributed IT environments requires. The Security Forum wants to understand how SOA will support secure operations, including in the Jericho Forum’s de-perimeterization environment, and we anticipate the SOA Working Group will similarly want to ensure SOA environments include effective security. Additionally, both the Security Forum and the SOA WG are addressing "governance" - so is there common ground here that again we might share to avoid duplicated effort?

The Security Forum presented a few slides on the Jericho Forum's de-perimeterization approach to effective IT security, and identified position papers it has published which explain the challenges and suggested high-level requirements for resolving them. This was illustrated by using the secure protocols paper as an example. The discussion developed organically into reviews of access zone concepts and multiple access zones as a possible future infrastructure architecture. OK - SAML and XACML define the protocols, but these are security mechanisms; we don't have any proven models for how to implement them, especially when we do not have a clear understanding on what SOA "services" do - are they agents controlling access to the resource, or the actual resource, and how do you handle chaining where one resource needs to access another resource to deliver the required application functionality? Aggregation raises major issues. Every time you integrate applications, this (access control) security decision process is needed. It is not specific to SOA but it is essential in SOA. To understand the challenges we need to remind ourselves of the fundamental access control model where enforcement points (PEP) provide the required controls. Discussion brought out the experience of how some members have implemented solutions. 

An incomplete list of key issues was started, but got curtailed by lively discussion taking another direction. The following issues were captured:

  • Audit problem - who uses the service? How is the decision made to permit access? Do you need to record the access for audit purposes (including non-repudiation)?
  • Are you permitted to use this service? What is the access control - policy and PEP?
  • A service is often the means (agent) to get to the resource, so is it sufficient simply to protect the service? Do I need also to protect the resource? How do we implement this chaining control?
  • What are the decision points in an SOA where security services need to be applied?
  • Risk and liability as one of the attributes - in a distributed environment, which service accepts liability? Can I trust the other party to give the service I expect/need? Control at a distance is hard, unless you pass authorization though some agreement mechanism down the chain. How should this be done?
  • Classification of services - not all services need security - WSpolicy.

The outcome was agreement that we all need to understand more about the problems, and find out what current best practice is, so let's go and look:

Action: All will investigate how other groups active in the SOA world are addressing the issues raised in the joint SOA/Security session in San Diego, and share their findings at the next conference.

No time was left for discussion on governance issues, but a preliminary discussion indicates that the SOA governance issues are more internal-procedural than the Security Forum's interest on how good security can support corporate audit and compliance to regulatory regimes.

Security Forum Joint Working with Jericho Forum

The Jericho Forum has produced several position papers which present in relatively brief statements the problems they see are different for IT security in boundaryless (de-perimeterized) environments compared to bounded environments. These papers follow a consistent structure which describes the problem, why you should care, the suggested direction for solutions, the rationale for coming up with that suggested direction, and the challenges this raises. These papers do imply "requirements" for changes to the way security products work today, but at a level which is too abstract/conceptual and high-level to be good enough for the product supplier and solutions provider to immediately understand, and the supplier membership in the Jericho Forum has not so far stepped up to the challenge to provide this translation. The Security Forum members are well qualified to do this correctly, so Ian invited them to consider taking this up as a Security-Jericho cross-Forum project that will deliver significant value to both Forums.

Discussion included some sadness that the Jericho Forum is not accepting the task to communicate effectively with the IT security supply-side to achieve its goals, and they agreed the need to present suppliers with clear requirements, proposals for migration of products rather than demands for new ones, and clear demonstration of market value and costs for undertaking development work on improved solutions for de-perimeterized environments. We could take up a project on this, based on interpolating and extrapolating a ghostly image for what the overall architecture should look like to fit the requirements we might draw out by reviewing the Jericho Forum position papers. This was agreed:

Action: Members accepted assignments to review specific Jericho Forum position papers, with the aim of extracting content that can be converted to actionable statements specifying realistic IT security requirements. 

Outputs

All the objectives set at the start of the meeting were achieved.

Next Steps

Follow-up of the actions agreed during the meeting.

Links

See above.


   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page