You are here: The Open Group > Enterprise Architecture Practitioners Conference Paris 2007 > Proceedings
       

Security Forum

Objective of Meeting

The objectives of this meeting were:
  • Final review to approve the Security Strategy White Paper for publication
  • Identity Management:
    • Review interest in a new project on Identity & Privacy - crypto-Id & domains of identities
    • Final call for interest in European Commission FP7 bid on Digital Identity & Security
    • Review & comments on ISO JTC1 SC27 WG5 3-part standard covering Biometrics, Framework for Identity Management, and Privacy
    • Status report on progress in ITU-T SG17 on their work on interoperability/interworking, common data models, discovery, privacy, and governance
    • Status report on Common Core Identifiers deliverables
  • FAIR (Factor Analysis for Information Risk):
    • Development of standard for Taxonomy
    • Assessment of development work required for Management Framework
  • SOA-Security - joint project with SOA WG:
    • Requirements and framework for solutions
    • Ongoing project plan for initial objectives and deliverables
  • Evaluation of requirements extracted from published Jericho Forum position papers
  • Future plans:
    • SOA-Security plenary presentation in July '07 Austin conference
    • Secure Architectures plenary and APC tracks in October 2007 (Budapest) conference

Summary

Introductions & Agenda Review

Ian Dobson (The Open Group staff Director of the Security Forum) welcomed attendees to the meeting, and after a round of introductions he presented the proposed agenda, which was approved.

He then gave a brief overview of the past and present activities of the Security Forum by reviewing the Security Forum web site - aided by the only attendee in our Paris meeting who had managed to capture an IP address. In the process he noted a few updates to the web page which he will apply.

Several members had picked up from the Security Program table in the exhibitors area  the leaflets describing the four areas of activity on information security which fall under the direction of Ian Dobson:

  • Security Forum
  • Identity Management Forum
  • Jericho Forum
  • Critical Infrastructure Enterprise Architectures Work Group

These leaflets are available from The Open Group Online Bookstore at www.opengroup.org/bookstore/catalog/t_is.htm.

Arising from this, Ian and other members explained to the new attendees the charters and developing interworking relationships between these areas of "security". Particular points arising in the ensuing discussion were: 

  • How particular industries like oil and gas have 24-hour instant response teams at strategic command centers, who already have necessary communications standard wireless links which other 1st responder services, so the objectives set out in the CI-EA leaflet merit further thought and revision. Ian will respond to this useful feedback.
  • The natural synergy between the Security Forum and the Jericho Forum, in that the Security Forum's emerging strategy was towards boundaryless (de-perimeterized) information security, and whereas the Jericho Forum is primarily a requirements-setting forum, the Security Forum is both a requirements and standards/guides group. One member described how a Microsoft presenter recently represented the Microsoft view of the future for information security - which is exactly the Jericho and Security Forums' approach:
    • Protection of the network reducing
    • Protection of the applications increasing
    • Protection of the data (information) increasing the highest

Ian also presented his "2007 key objectives" for his Security Program. Discussion brought out clearly that members are against introducing  the word "architecture" into the Security Forum's title, though of course the members are keen to develop security architectures. 

Additionally these "key objectives" mentioned that due to dwindling support from the previously active members of the Messaging Forum, during Q107 its activity has ceased, its work - including its web site - has been archived, and it is now closed as an available Forum of The Open Group. It left a "message retention" project that was started but is uncompleted. In this Paris meeting, one Security Forum member expressed interest in this work, so Ian will extract the progress on this project from the Messaging Forum archive and present it for evaluation and expressions of interest from all Security Forum members.

Identity Management

This was a joint meeting of the Identity Management Forum and the Security Forum. See the separate meeting report.

Security Strategy White Paper

The Security Forum chairman - Mike Jerbic - joined the meeting by teleconference for the first 30 minutes of this item. The latest draft is available to members only at www.opengroup.org/projects/security/protected/.

Initial discussion clarified that this White Paper is aimed at two main audiences: the Security Forum members, and the public. The intent is to provide both of these audiences with a clear declaration of the Security Forum's future direction and goals, the context being that the Security Forum members' aims are to clearly differentiate our objectives from other security standards groups, and to explain how our Security Forum's activities are focused on making a real difference in our contribution towards delivering effective information security.

We have been waiting for the ABA Cyberlaw group to provide their feedback on this White Paper, ever since they discussed it and declared they would contribute a few items of feedback following their in-depth review of it in their Winter Meeting in the 3rd week of January 2007. Regrettably their designated contact has been unable to find the time to do so over the past three months, and neither is he able to give us an expected date when we might receive it. Therefore, we have agreed that since their feedback would not include any major normative material, we will proceed to publication now, and update it as a living document as the need arises.

Part of this update will be in using it as our overall vision of what we do, to include commentaries on our activities as we do them, and thereby to show how they fit into our strategy. The FAIR project will likely be the first addition in this category - addressing the key elements of risk and showing how to quantify risk based on these elements - for example, if legal compliance requires a risk management-based solution, then a risk management framework is needed to demonstrate this, and FAIR will provide this.

Further discussion brought out a few issues which Ian will add to our usual sanity-check activity - through The Open Group's editorial checks - to improve quality prior to publication. One significant addition will be an Executive Summary.

Privacy through Domains of Identity

In our previous meeting (San Diego, January 2007) we had a well-supported discussion on this topic - see the San Diego Security Forum meeting report available at www.opengroup.org/public/member/proceedings/q107/30IM.htm for a summary of the issues and discussion. This item was included in our Paris meeting agenda as a placeholder to facilitate members continuing the discussion, and perhaps exploring opportunities for developing a project based on it. In the event, the member who proposed and presented this topic in San Diego was unable to join the Security Forum meeting. Accordingly, Ian will follow up to establish interest from the original proposing member in playing a lead role in any new project based on this topic, and then invite declarations of support for contributing to it from the members of the Identity Management Forum and Security Forum.

FAIR (Factor Analysis for Information Risk)

Members first reviewed the actions taken away from the previous meeting in San Diego (January 2007) - see www.opengroup.org/public/member/proceedings/q107/30SF.htm - to assess progress and modify our next steps accordingly. It was established that the key actions have been taken or are underway, including taking the "risk management" message to members of the Jericho Forum to invite their support for this project. 

One significant question which we must answer - and which is not covered in the FAIR White Paper - is the business value that FAIR contributes. It does provide a taxonomy for analyzing risk, and a mechanism for applying that taxonomy to specific threats and vulnerabilities in an organization. Assuming it achieves these objectives successfully, the next step in the business context is to have some process to use the results of the FAIR analysis to manage the risk that FAIR has revealed, to lower the exposure of the business to that risk. The value of using FAIR - or any other risk management assessment process - needs to be demonstrable as a business cost/benefit. The result(s) that FAIR produces to measure the risk(s) must therefore be usable in some effective management process that translates into measurable business value return, to show how it contributes to reducing the business' threat profile or vulnerabilities or exposure to loss. We will investigate this key business requirement as a high priority, using our well-proven approach:

  • What problem are we trying to solve?
  • Why should my business care; what are the likely consequences of not caring?
  • What are our recommendations? Impact on people, process, and technology.
  • What added value and business benefits will be achieved by following these recommendations?
  • How will we demonstrate that these recommendations will deliver an acceptable solution?

The draft White Paper - available from Risk Management Insight (RMI at www.riskmanagementinsight.com) and also available on our web site (see www.opengroup.org/projects/security/) - explains the taxonomy of the FAIR approach to analyzing risk, and the method used in measuring risk. It does not include any part of the computational engine, or the simulation model, and neither does it include any software/tools to support implementing the methodology. Additionally, the RMI principals provide training courses as part of their revenue stream. The proposal from RMI is to offer their taxonomy and framework for adoption as the basis for a standard on FAIR, to promote its adoption as a global standard for measurement of risk.

In this meeting, members worked through the RMI White Paper, with the help of a set of summary working slides to facilitate maintaining members' awareness of the context of the detail in their review, but without the benefit of the RMI sponsors to resolve questions which inevitably arose. The objectives of this first detailed review were  to assess acceptability of the FAIR taxonomy as a basis for analyzing risk, and of the framework it uses to evaluate risk. Good progress was made, resulting in a number of queries which Ian will take up with the RMI principals. The responses from RMI will be shared with the members, and we expect to follow up in subsequent teleconferences between now and the next meeting (Austin, TX, July 23-27), so we can review a mature draft of the taxonomy as part of assessing the overall plan for this FAIR project.

A further consideration proposed by the Security Forum's Chair is to invite the RMI principals to run a one-day tutorial on FAIR as part of our meeting in Austin, to enable members to become sufficiently informed on what FAIR provides and how effective they believe it is, sufficient to make informed contributions and judgments on its development towards becoming acceptable as an Open Group standard. All present in the Paris meeting supported this proposal, and during the meeting the RMI principals emailed their agreement in principle. The Tuesday of the Austin meeting was preferred by the members present. Ian will work out a mutually agreeable day. 

SOA-Security (Joint Project with SOA WG)

Interested members of the Service Oriented Architectures Working Group joined the Security Forum members in a review of the current direction and progress of this project. The Security Forum's objectives are to raise awareness of the information security issues that arise in distributed networked systems where applications call on services from systems which they have no control over and which therefore have to perform some kind of federated trust and share delegated assertions on authentication and access control. With none of the current members of this joint project present in the Paris meeting, this meeting session provided an opportunity for non-members of the joint project to offer their assessments.

The attendees in Paris first reviewed a few progress-to-date slides summarizing the outcomes of the three teleconferences held since formation of the SOA-Security project in our January 2007 meeting, which included a list of the initial set of project objectives and deliverables. A key part of these deliverables is the need for an infrastructure and business scenarios on which we can map the problem issues that project members are raising, so we can be clear on what issues are of highest priority and concern, and what gaps we must cover to ensure we create a complete model that will respond to the essential requirements in SOA enterprise architectures.

Two members from the SOA WG provided valuable contributions to understanding the SOA environments that we need to ensure are enabled to operate securely.

One of these contributions presented a slide showing an example of an SOA reference model, in which four "safe SOA categories of issue" were identified. The presenter challenged the security members to agree if these would be the actionable attributes for security in SOA. As co-director of the joint SOA-Security project, Ian will liaise with his counterpart from the SOA WG (Chris Harding) to bring this question into the joint SOA-Security project team for evaluation. Comments from the Security members were that the infrastructure as presented was complex and appeared at first sight to include some implementation-specifics rather than technology-neutral components which would need further understanding, and also that we should not forget that a similar challenge should be raised on what are the actionable attributes for manageability of the SOA environment.

The other contribution was the IBM Red Book on SOA Architecture. This book is generally recognized as have significant authority, providing much accumulated expert guidance in some 428 pages. It includes three - possibly four - significant scenarios which are likely to be of value to the SOA-Security joint project members, and is a free download. (See www.redbooks.ibm.com/abstracts/sg247310.html?Open.)

A further source for relevant scenarios is the slides first presented by a member of the Security Forum in our January 2007 joint meeting, showing two access scenarios A and B, each presenting basic issues on access control requirements for achieving secure access to the service they control. 

The discussion on these items was so vigorous that it overflowed the normal 90-minute session by a further 27 minutes before the chair for the meeting brought it to an arbitrary halt - to be continued by those who wished to do so outside the formal meeting. It actually did continue through the following meeting break time.

Ian will co-ordinate actions to bring these three resources into the joint project team.

Jericho Forum Requirements

An action from the previous meeting (San Diego, January 2007) was taken by five members to each extract from two Jericho Forum position papers the real security requirements that the Jericho Forum's published position papers contain. These papers are available from the Jericho Forum's public web site at www.opengroup.org/jericho/publications.htm.

The Security Forum members used a common template for this review, the objective being to provide a consistent presentation of results. To date we have the results for eight of these ten Jericho Forum position papers, and await the results for the remaining two papers.

Preliminary results on six of these papers were presented to the Jericho Forum in their members' meeting on March 16th. We aim to present the final results on all ten papers in their next Jericho Forum members' meeting on May 25th. Ian will co-ordinate pulling together this presentation, and report back to the Security Forum members.

Future Plans

Members of The Open Group staff conference team joined the Security Forum meeting for this item.

The next meeting is scheduled for July 23-27, co-located with The Open Group conference that same week, where the Monday plenary theme is "Architecting your Service Oriented Enterprise". Security Forum members are requested to recommend one or two plenary speakers with relevant experience to contribute a presentation on the security considerations that IT architects need to include in their work. 

The following Q407 co0nference is in Budapest, Hungary, on October 22-26, 2007, where the plenary theme is "Secure Architectures". Security Forum members are requested to contribute to the planning of this plenary (6 to 8 speakers, including a keynote) on the Monday, plus two Architecture Practitioners Conference tracks (up to 8 speakers in each track) on the Tuesday and Wednesday. Ian had drafted a proposed publicity flyer for this conference, which was reviewed by the members. It will be used to provide the content on the Budapest Conference home page. Discussion focused initially on gathering a list of potential speakers who we would like to invite to give presentations in the Monday plenary. For the APC tracks we should aim to keep as many of our Monday plenary speakers as possible as contributors to our Tuesday APC track, as well as encourage members to give presentations. An action plan was agreed to follow up on the suggested list of speakers gathered in this discussion.

Outputs

Decisions and actions going forward are summarized in the Summary section above.

Next Steps

A detailed actions list for members has been circulated and will be progressed between the Paris meeting and the next meeting in Austin, TX (July 23-27, 2007).

Links

See above.


   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page