You are here: The Open Group > Architecting to the Edge™ > Proceedings > Report
       

Security Forum

Objective of Meeting

The Security Forum meeting in Washington DC ran from Wednesday through Friday, April 26-28. The first day was a joint meeting with the Identity Management Forum in which we  covered our shared program of activities. The Thursday and Friday provided a full agenda on Security Forum activities. The activities covered included:

  • Security Strategy White Paper
  • Trust Models Guide
  • Identity Management (joint with the Identity Management Forum):
    • Framework for Identity Management (joint with INCITS & ISO JTC1 SC27)
    • Architectures for Identity Management
    • IdM Design Patterns Workshop
    • Identity Management Catalog
    • Common Core Identifiers (joint with NAC and DMTF)
    • Best Practice Guide for Directory in IdM
    • IdM Standards for TOG Standards Information Base
  • Security in Data
  • Collaboration with the Jericho Forum:
    • Security Strategy White Paper and Jericho Forum Roadmap
  • Collaboration with the American Bar Association Cyberspace Law Section:
    • Security Strategy White Paper

Summary

The Security Forum agenda and activities status was presented in a set of summary slides which are available here.

Liaisons & Industry Update

A  regular part of Security Forum meetings that members place high value on is hearing reports from other members on significant IT security events, activities, and new developments/directions they have encountered since the previous meeting. This meeting was no exception - with reports and ensuing lively discussions on Homeland Security, changes in ISO JTC1 SC27 IT security standards working groups, NIST April 2006 workshop on PKI, developments in  the Jericho Forum, Network Centric Operations Industry Consortium (NCOIC), and several other newsworthy items. These exchanges of news and opinion are available only to members.

Security Strategy White Paper

Prior to their Friday joint meeting with members of the ABA Cyberspace Law group, Security Forum members reviewed comments on the latest draft outline and synopsis for this White Paper. This review and discussion resulted in agreed updates to clarify and expand the proposal, and improve understanding of our future direction for this work. Specific decisions include to bring out as a major theme the notion of "control" as fundamental to security, and to add a legal/regulatory view into the enterprise architecture.  See the follow-on discussion reported below under Collaboration with the American Bar Association Cyberspace Law Section.

Trust Models Guide

This project has suffered from scarce resources over the past six months, due to higher work priorities elsewhere. The intended use for it remains valid, though less urgent than was believed at the start, and its content remains relevant and useful, and is unique in that it evaluates failure modes - what happens and what are the business consequences when a given trust model fails in any one of several different ways. Members agreed that we will make an effort between now and the next meeting (Miami, July 17-21) to gather the missing contributions needed to complete this document, and will also share it with the Jericho Forum members who are also working on their Trust & Transivity positioning paper.

Identity Management (joint meeting with the IdM Forum)

  • Framework for Identity Management: This is a joint project with international standards bodies INCITS CS1 and  ISO JTC1 SC27; we are awaiting formal notification that we have been granted category C liaison status with ISO JTC1 SC27, which will entitle us to make direct review representations to their drafting the ISO Standard on this topic. SC27 is currently revising its working groups structure into five working groups. This restructuring activity is delaying their progress on project work, including on this framework Standard. ISO JTC1 SC27 Working Groups are meeting in Madrid Spain, May 8-12. We may expect a pre-Madrid meeting draft next week, and may submit comments on it before their May 8-12 meeting if we so wish. We look forward to progress from their Madrid meeting, although we understand they have allocated only one hour to developing this IdM Standards framework document.
  • Architectures for Identity Management: Due to other work priorities, little progress has been made on this document since the previous meeting in Barcelona. The situation remains that the co-editors have yet to decide whether to develop new material to fit into the revised structure so it presents a balanced view, or to revise the structure (yet again) to fit the material that they currently have. They are looking for additional resources to complete this project. Noting that there is significant value in the existing draft, we will make the latest draft available to all members on our IdM web page and invite renewed review to establish exactly what additional contributions are needed, and establish a realistic plan for completing it.
  • IdM Design Patterns: The revisions for our 3rd Party Identification and 2nd Party Identification design patterns are captured in notes from the design patterns workshop session held in Barcelona, but are not yet available in revised pattern definitions. Work will continue to complete this activity, which is expected to result in almost final patterns. We are also interested in developing an authenticator design pattern, and have hopes of developing a draft for it for review in the next conference (Miami, July 17-21). Members also noted that several new books on security design patterns have been published recently. Members agreed to take our design patterns work forward by reviewing our current work in the light of these new publications, and shifting our focus between now and the next meeting to considering applying existing design patterns to specific security problems - such as are being proposed in the Jericho Forum's de-perimeterization space - to demonstrate the value of using a design patterns approach to solving today's IT security problems.
  • Identity Management Catalog: We have now resolved the final issues on updating our questions in the IdM Catalog template, so will update the template as soon as possible, and then invite those with existing entries in the Catalog to revisit their responses in the light of the clarifications the revised questions provided. Work is progressing well on development of an advanced web page display system for our Identity Management Catalog, and we will drive this through to completion as rapidly as time permits. It was agreed that we will aim for launch of our IdM catalog at the July Conference in Miami - this will require a deadline of June 30 for close of entries by vendors, allowing time for approval by our Editorial Advisory Board, and preparation of a press release involving the vendors who have provided entries.
  • Common Core Identifiers (joint with NAC and DMTF): The Company Review of the CCI Business Scenario and the CCI Framework (comprising the framework document, and the framework matrix spreadsheet) closed on April 11, and the ballot on change requests closed on the day of this meeting (April 26). Members of the IdM Forum were the prime review and balloting constituency in The Open Group. The NAC are running their review of this document concurrently and we are coordinating their feedback so as to close on mutually agreeable solutions. The DMTF has not participated in the CCI work in recent months and has indicated that they have copyright problems with joint publication, so publication of the approved document my not include them. There is also liaison activity underway with W3C to explain why their URN does not serve the requirement for a CCI (the reason is because URN is tied to a protocol), and with OASIS to follow up on evolving their XRI standard so it meets the requirements that have been identified for CCI. The resulting published CCI documents are expected to provide high value to those engaged in the area of shared identifier usage across organizational boundaries - a very difficult area because of problems migrating from the many legacy systems that currently exist, business reluctance to invest in moving from solutions that currently provide adequate solutions for today (though probably not tomorrow), and the purist problem of agreeing what is a "final" solution for an enduring (permanent) universal unique identifier scheme in an industry that is characterized by adaptability and change.
  • Best Practice Guide for IdM: Members received a presentation proposing this new project - to develop a best practices guide for Identity and Access Management Framework (IAMF), covering what IT needs from the infrastructure and why. The presenter declared willingness to lead this project. The outline structure proposed addressed this under several key headings: high availability, serviceability, leveraging mature & established industry standards, performance, security, compliance with legislation & regulations, hardware, and case studies. All members were invited to review this proposal, provide their feedback, and indicate their interest in being an active contributor/participant.
  • IdM Standards Entry in Standards Information Base: Members reviewed the final draft preparatory to submitting it for Company Review, made further additions to include standards called out in the CCI matrix, and deleted some that were viewed as peripheral or not current. The resulting draft will be submitted for Company Review directly following this meeting.

Security in Data

Members had a refresh of the presentation given in the previous meeting (Barcelona, January 2006), in which he proposed a set of five precisely defined security components which would represent the basic elements of a secure system. In this presentation, these components were deliberately named exclusive of existing security terminology to ensure they carried no inferred characteristics or functions from existing common security terminology. In that presentation, these components were used to demonstrate how they would provide the essential functionality of an accountable, reconcilable transaction. Also in the Barcelona presentation, recognizing that this new view requires extensions to cater for secure operation in  more complex transactions, two further components were added to make seven in all, with an understanding that more may be needed as we acquire experience of applying them. Members took away from Barcelona an appreciation and intent to work on this new approach to security, to figure out what the design rules are, how they relate to existing practices, what data format is required, and putting it together in a holistic topology. In this Washington DC meeting, members recalled their earlier discussion on Identity Management design patterns, in which they agreed to review the de-perimeterization work underway in the Jericho Forum and look for a Jericho Forum problem that they would like to address using both security design patterns to demonstrate the effectiveness of applying design patterns to analyzing and solving real IT security problems. They also decided that a good way to test this "security in data" approach would be to apply the seven components thus far defined to the same Jericho Forum problem and see what outcomes this approach produces. This represents a second substantive outcome arising from the intent agreed in our joint meeting with Jericho Forum members in Barcelona (January 2006) to collaborate on areas of common interest in IT security.

Collaboration with the Jericho Forum

Arising from the intent agreed in our joint meeting with Jericho Forum members in Barcelona (January 2006) to collaborate on areas of common interest in IT security, the outcomes from the members' discussion on "design patterns" and on "security in data" have resulted in two substantive areas where the IdM and Security Forum members aim to collaborate with the Jericho Forum to work on specific de-perimeterization problem areas. A third area is taking the Jericho Forum commandments into the Security strategy project. A fourth area is evaluating the Jericho Forum Positioning Papers - the first four were published electronically on April 25 and announced during the Jericho Forum's Annual Conference that day. It was noted that a conclusion in the Voice over IP paper is that standards groups need to work together on providing an open standard in this area - this represents a fourth challenge that the Security Forum will evaluate. A fifth collaboration is sharing the Security Forum's Trust Models draft document with the Jericho Forum members who are developing their Trust & Transivity positioning paper.

Collaboration with the American Bar Association Cyberspace Law Section

On Friday April 28 the Security Forum held a joint meeting with the American Bar Association's Cyberspace Law Section's group that is addressing Connectivity, Storage, and Computing Infrastructure, at the World Bank HQ in downtown Washington DC. This was at the invitation of an ABA member who is leading this ABA group. They are keen to leverage the past successful collaboration with the Security Forum on the Framework for Electronic Chattel Paper, to work with us on developing our Security Strategy White Paper, which they see represents a significant contribution to their group's goals. After initial introductions and positioning representations, attendees reviewed the Jericho Commandments, and the impact of de-perimeterization on secure IT operations, as a vital contribution to the White Paper, and also as a valuable level-setting discussion to steer our further discussion. The discussion then moved on to detailed review of the Security Strategy synopsis and structure for the White Paper. Valuable new contributions were captured from this wide-ranging discussion, and these will be consolidated into a revised document that will form the basis for further development between now and the next meeting.

Outputs

Agreement on a set of actions to progress the work discussed in this meeting.

Next Steps

Issue and progress completion of the agreed set of actions arising from the meeting.

Links

See above.


   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page