C:\ian\Security\q305\report-template-include1.shtm

Security Forum

If a broken URL is encountered on this page, the target report is not yet available and we are awaiting its submission.

Objectives of Meeting

The objectives of the meeting were:

  • To engage fully in contributing to the Security Forum interests in current projects, jointly with other Forums of The Open Group, and external Forums
  • To progress current projects within the Security Forum membership, and update the Security Forum's strategy, plans, information exchange, and new project proposals

Summary

The Security Forum agenda for the conference week is available here:

Information Assurance Meeting

On Tuesday July 19th, Security Forum members attended the open-day meeting on "Information Assurance for High Risk Environments", arranged by the Real Time & Embedded Systems Forum. See the separate report, or send a request to i.dobson@opengroup.org  for further information.

APC Stream 10 Meeting

On Wednesday July 20th, Security Forum members contributed to the Architecture Practitioners Conference Stream 10 - A Step-by-Step approach to Architecting the Secure Enterprise. This APC stream was based on the joint Security-Architecture Forum project whose objective is to deliver to the Architecture Forum a documentation package which extends TOGAF to integrate information security into the architecture development methodology (TOGAF ADM). See separate report, or send a request to i.dobson@opengroup.org for further information.

Identity Management

On Wednesday July 20th, the Security Forum and Directory Interoperability Forum (DIF) held a joint meeting. The full report on this meeting is provided separately. However, because the Security Forum is a full paricipant, the highlights are also summarized here:

  • A proposal to transform the Identity Management program into a new Identity Management Forum, with joint membership and leadership controlled by the Security Forum and DIF, and the DIF operating as a Working Group within the new IdM Forum, was approved.
  • The Framework for Identity Management Standards - a project that includes external liaison with INCITS CS1 - was progressed.
  • Bob Blakley (IBM) led a session by teleconference link on developing design patterns for identity management.
  • The project to develop a Guide to Architectures for Identity Management was progressed, with target dates set for company review in September 2005.

Integrating Security into TOGAF ADM

On Thursday July 21st, members of the Architecture Forum joined with the Security Forum to continue work to extend the TOGAF ADM by adding considerations of information security. Discussions in teleconferences between the previous Dublin conference and this New York City conference had established that this project is focused on identifying high-level security issues that the enterprise architect should include in developing IT architectures using the TOGAF ADM approach. It is emphatically not a comprehensive guide on how to do architectures for information security. The question is left open for Security Forum members to take up the challenge to create a guide on how to do effective information security. Concern was expressed by Security Forum members on what artifacts will define compliance, certification, and verification in Phase G; the answer was that these artifacts are in the "how to do security" domain, not in TOGAF ADM. Another concern was also expressed over Phase G and how it separates enterprise architecture standards for software development (ITIL, Carnegie-Mellon, etc.) from the ADM process; the response was that this line is moveable - it depends on how the architect instantiates the ADM to match the business requirements for the architecture being created, but if your organization requires a specific EA methodology then it should be called out in Phase G. After brief review on other issues, it was agreed that we should aim to complete this project by the time of the next conference, so dates were agreed accordingly for company review to start on August 28 and close on September 25.

Certificate Policies for PKI-Based Email Encryption

On Thursday July 21st, the Security Forum joined the Messaging Forum to review their requirement for reducing the workload involved in agreeing Certificate Policy Statements between collaborating partner organizations. A mini-business-scenario workshop approach was used to quickly gather the relevant responses to the range of questions raised in our business scenario methodology, and this resulted in spectacularly useful outcomes which identified a totally different solution space to that which was implied at the start of the meeting. Actions were assigned to determine what further development might be appropriate, and we will hold a further checkpoint meeting during the next conference to determine the best way forward. See the separate meeting report, or send a request to i.dobson@opengroup.org for further information.

Trust Models Guide

On Thursday July 21st, the Security Forum reviewed progress on its Trust Models Guide. Progress has been slow since the previous meeting, but a  teleconference is arranged for July 25th in which we expect to make significant further progress. Based on the outcome of this teleconference we will plan how we will complete this project.

Digital Rights Management

The DRM Guide has now completed its company review, and having applied all the agreed changes it is ready for a final sanity check before submitting it for Governing Board approval.

Security Forum Administrivia

On Thursday July 21st, the Security Forum reviewed its strategy, project plans, and deliverables, information exchange between members, and consideration of new project proposals. Updates will be reflected in updates to the Security Forum's web pages.

Framework for Control of ECP

On Friday July 22nd, the Security Forum hosted a joint meeting with the American Bar Association's Cyberlaw Committee, to progress its joint work to develop a Framework for Control of Electronic Chattel Paper. See the separate meeting report.

Outputs

Outputs as concluded in the Summary above.

Next Steps

Actions as indicated in the Summary above.

Links

See above.


   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page