You are here: The Open Group > Conferences London 2009
       

Security Forum Members' Meeting
(including Jericho Forum)

Objective of Meeting

  1. To run the 2nd Security Practitioners Conference (SPC)
  2. To review all current Security Forum projects and progress them to their next respective stages
  3. To hold a joint meeting with Jericho Forum members on items of significant mutual interest

Summary

The 2nd Security Practitioners Conference (SPC) is summarized in a separate report, which includes links to the presentations.

All current Security Forum projects were reviewed and progressed, as summarized below

SOA and Security Guide

Two members of the SOA and Security Working Group have developed an "SOA and Security" chapter that they propose should be added to the SOA Working Group's "SOA Source" book, which was published earlier in 2009. One of the authors of this SOA and Security chapter joined the Security Forum to present and explain specific features in the content of this new security chapter. It was agreed that we should compare the coverage in this new chapter with the draft SOA & Security Guide that has been developed by the joint SOA Working Group/Security Forum group, to verify that all valid content has been included, prior to this new chapter proceeding to formal review leading to publication. In undertaking this action, members appreciated the desire to promote good progress towards achieving successful completion of the new Source Book chapter review process before the next conference in July 2009.

Risk Management (FAIR) Cookbook Standards

Refer to the Risk Management web page for this project. The two project leaders are continuing their work on developing a Cookbook to demonstrate how to apply our published Risk Taxonomy standard to the ISO 27005 standard – to show how our Risk Taxonomy enhances the accuracy and consistency of the risk assessment results. Delivery of the first draft of this Cookbook is planned for end-June 2009, and is expected to be available to members for review and development in our next meeting (Toronto, July 2009).

Enterprise Security Architecture (update to NAC ESA) Guide

Refer to the Risk Management web page for this project. The charter for this Working Group is awaiting approval by the Working Group members, at which point the Working Group will commence revising the ESA Guide as agreed in the charter.

Automated Compliance Expert (ACE) Standard

Refer to the Risk Management web page for this project. The objective of ACE is to automate the modeling, reporting, and execution of applicable compliance requirements across a complex system environment, alerting to any component falling out of compliance. The project leaders (from IBM) are in discussion with NIST over the issue of alignment with the requirements of NIST's SCAP (System Management Compliance Implementation) and XCCDF; the SCAP requirements are a US Government requirement, and they are proving to be difficult to implement in IBM's pilot. IBM presented their fact sheet on their pilot implementation, which comprises three main components: policy; target compliance requirements; and conflict resolution. We will request the project leaders to share the non-proprietary parts of this fact sheet with our ACE Working Group members, to provide description of the necessary components in any implementation that conforms to the target ACE standard. We will also maintain progress in further ACE conference calls leading up to our next meeting (Toronto, July 2009).

Events and Logging (XDAS/CEE) Standard

Refer to the Risk Management web page for this project. Slow progress is being made, primarily due to our desire to maintain good understandings with the Mitre CEE (Common Event Expression) project members on aligning our proposed updated XDAS standard with their proposals for what CEE will look like. We now have shared with the CEE steering group members the first four chapters of our updated XDAS standard and asked for their review and feedback as to whether it provides an acceptable alignment with their intended direction for CEE. We will persevere with seeking alignment with the Mitre CEE members, to ensure we and they end up delivering a single standard for event recording, reporting, and logging.

Collaboration-Oriented Architectures (COA) Framework Standard

The COA Framework is currently published on the Jericho Forum web site as a set of 23 position papers, one of which describes the COA concepts, another describes the framework components, and the rest describe each component in more detail sufficient to understand the requirements for that component. This presentation is not easy to consume and is time-consuming to download. While it addresses a framework for secure architectures in de-perimeterized environments and these include de-perimeterized Cloud Computing environments, the COA framework does not mention Cloud Computing. We agreed we should create a single COA Framework standard with a structure which

  • Introduces the business case for de-perimeterization
  • Includes the commandments as our measure for effective security in de-perimeterized environments
  • Presents the COA concepts and the COA Framework components
  • Includes the COA component support papers as include files in the build of the single document, in a format which results in a consistent presentation

Secure Mobile Architecture Standard

Refer to the SMA web page for this project. The SMA project leader has proposed that we evaluate the latest proposed content for the SMA standard for mapping onto the Jericho Forum's COA Framework, and possibly use TOGAF to validate it. The active SMA Working Group members are evaluating this proposal.

Eco-System for Security Standard

Refer to the Eco-System for Security web page for this project. The charter for this Working Group is agreed, and the Working Group leader will initiate the development work following this London meeting. 

Security Forum Strategy Paper (Update to include COA)

The Security Strategy paper published in 2007 merits an update to include the COA Framework as a direction for architecting secure systems for de-perimeterized/boundaryless environments. We should also consider including reference to the Enterprise Security Architecture publication and the associated ESA update project.

Trust Management Standard

Refer to the Trust Management web page for this project. The objective of this standard is to define the three primary trust taxonomy components:

  • Impact of failure
  • Classification of data
  • Level of trust (impact sensitivity)

which enable derivation of a control stratification scheme – i.e., the controls that are appropriate to achieve the desired outcome – for management of trust. The Jericho Forum has published a set of trust management papers as part of its COA Framework (papers available at www.opengroup,org/jericho/publications.htm) and an associated slide presentation summary of what was agreed in the Q308 Security Forum meeting. We will use these source materials, plus refer to an existing NIST standard on this topic, to draft a Trust Management standard for members to review and develop.

Enterprise Web 2.0 Security

Refer to the Enterprise Web 2.0 web page for this project. The Web 2.0 Security Threats draft document is awaiting two further contributions before being made available to the project Working Group members for review and development. The Case Studies document is available on the web site (members-only) for review and development. The other two deliverables will be initiated when these first two items are nearing completion. The project leaders will run conference calls to progress review and development of these first two deliverables.

Members' Review & Feedback from RSA (San Francisco) and Infosecurity (London)

The Jericho Forum conference on Wednesday April 22 was attended by about 40 delegates. Speakers were excellent, and attendees offered complimentary feedback. The blogger speakers were appreciative that the Jericho Forum was keen to invite them to give their constructive criticism. A learning point from review with Bateman and the Jericho Forum after the event concluded that we would have much greater impact if we located our event inside the RSA event rather than offsite in The Open Group office; we knew this from the previous year but the cost of an RSA theatre is higher than we are comfortable to fund.

The Externalization Panel in Infosecurity's Keynote theatre (Thursday April 30) was also attended by some 40 people, and again feedback from attendees seemed good. The relatively low attendance could be due to lack of recognition of the "Externalization" title, and may also not be helped by being on the last afternoon of the event.

Cloud Security Alliance – Collaboration Proposals

Discussion included review of the discussions held so far between The Open Group representing the Jericho and Security Forum interests, and the leaders of the CSA. These discussions started prior to the RSA event and have been ongoing during RSA, in a CSA Introduction in the SPC Plenary on Monday April 27, in a CSA-UK  reception on Wednesday April 29, and in the Friday May 1 joint meeting. The discussion confirmed the desire on both sides to set up a mutually beneficial collaboration agreement with the CSA. Earlier discussion in the Security Forum had compared where overlaps exist to varying extents between the Jericho Forum's COA Framework papers and the CSA's 83-page Guide (see slides), and this is seen as one useful area for collaboration – to add value by sharing understandings at the Jericho Forum position papers/CSA domains level. Another level up from this is the infrastructure, where the Jericho Forum's COA Framework provides a security component structure and now a Cloud Cube business model which has been noted from discussion in our RSA event compares well with the CSA Guide's infrastructure approach. A further level is evident in that the Jericho Forum is primarily a thought-leadership group focused on future needs, whereas the CSA has its focus on more immediate pain-points which need addressing, and the Security Forum has a role to play somewhere in between. It was agreed that we should formalize the basis of setting up a collaboration agreement in a Memorandum of Understanding (MoU), so follow-up actions were agreed aimed at drafting collaboration agreements between the CSA & Jericho Forum, and CSA & Security Forum. A further aim will be to harmonize the resulting CSA collaboration objectives on The Open Group side.

Cloud Cube Model – Feedback; Use-Cases Review

The agenda intended to include new risks to and from the Cloud, as well as a focus on use-cases review for each sub-cube area in our Cloud Cube model, but shortage of time prevented addressing this new risks issue in this meeting. After a review on the dimension definitions in our Cloud Cube model, in which discussion focused on the real meaning of Perimeterized & De-perimeterized, the attendees focused on identifying existing substantive examples of use-cases in each of the eight sub-cube areas. These were captured in the meeting and will be circulated to the membership for review.

Reference Architecture for COA, Mapped to the TOGAF 9 ADM

Refer to the COA Reference Architecture web page for this project. The Charter defining the objectives and deliverables for this project is available on the web page. Significant discussion took place on clarifying what the reference architecture would deliver in terms of value to whom, and on how much the project members needed to understand about the TOGAF ADM. It was agreed that we will organize at least one conference call where the Architecture Forum representatives in this project will explain the minimum TOGAF ADM understanding that all project members will need to have in order to proceed with developing a COA reference architecture. We expect that the understanding we gain on the TOGAF ADM will provide acceptable answers on the value and nature of the deliverable reference architecture, and equip the project members to proceed with developing it.

Self-Assessment Guide – Progress

We will plan one further conference call on the Jericho Forum commandments Self-Assessment Guide, which we hope will enable us to complete the first draft of this Guide my end-May, for review by the membership during June.

Security Incident Database – New Project Proposal

This proposal arose from a Webex in February 2009 on the Security Forum's Risk Taxonomy which was published in January 2009. Discussion concluded that this is not an activity that interests members of the Jericho Forum, and that collecting valid data on security incidents is error-prone and requires resources we do not readily have available. The Security Forum members remain interested, so we will create a draft charter defining the objectives, value, and plan for this proposal, for evaluation and expressions of interest from Security Forum members.

Involvement in Relevant Conferences

The Jericho Forum often receives invitations to provide speakers at conferences world-wide. Two of specific interest are the SC World Congress in October 2009, and RSA-Europe. It will be useful to compile a list of these conferences and events so as to consider submitting proposals for Jericho Forum panel sessions, where we can draw the actual panelists from whoever is available at the time of each event.

Outputs

All the objectives targeted in the agenda for this conference were achieved. They are summarized in an Actions List which will be used by the members to monitor progress between this members meeting and the next members meeting which is scheduled for 21-22 July 2009, in Toronto, Canada; see www.opengroup.org/toronto2009.

Next Steps

  1. Plan and execute the next SPC, which will be a two-day conference beginning on Tuesday July 21 2009, in Toronto, Canada
  2. Undertake all the actions arising from this meeting

Links

See above.


   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page