You are here: The Open Group > IT Architecture Practitioners Conference Miami 2006 > Proceedings
       

Security Forum

Objective of Meeting

Progress all the current projects underway in the Security Forum, as follows:

  • Security Strategy White Paper - collaborative activity with the ABA Cyberspace Law Group and the Jericho Forum
  • Trust Models Guide - establish plan to complete this project
  • Identity Management (joint meeting with the Identity Management Forum):
    • Framework for Identity Management (joint with INCITS & ISO JTC1 SC27)
    • Architectures for Identity Management
    • IdM Design Patterns
    • Development of the Identity Management Catalog - input to catalog database, and development of web-based display of information entries from the database
    • Next steps after completing the Common Core Identifiers deliverables
    • Best Practice Guide for Identity & Access Management
  • Collaboration projects with the Jericho Forum:
    • Security Strategy White Paper & Jericho Forum Commandments
    • Application of design patterns to Jericho Forum security problem
    • Application of Security in Data approach to Jericho Forum security problem
    • Evaluation of Jericho Forum positioning papers

Summary

Introductions, Agenda, Industry Update

As is customary in Security Forum meetings, members started their meeting by reviewing the agenda to clarify expectations and adjust the focus of specific meeting sessions to meet these expectations. They then reviewed the actions from the previous meeting (April 2006, Washington DC) to establish the status of our current projects and plan what progress we expect to make on them in this meeting.

Members then shared news and views on conferences and other events and industry developments which they felt were significant over the past three months (since the previous conference).

Relationships with Other Forums and Groups

Discussion with the Identity Management Forum and its overlap with the Security Forum's agenda was extended to consider the relationship between the Security Forum and overlaps with the Jericho Forum. It was noted that the Jericho Forum membership and objectives are focused more on requirements, which compares with the Security Forum members' focus more on considering how best to propose and develop standards and best practices responding to information security problems. Further discussion concluded that we should consider the opportunities to leverage the strengths of all these Forums to work together to best effect, including with our other strategic alliance with the American Bar Association. We will hold teleconference discussions with the key contacts in these groups to explore mutually agreeable ways to re-organize to best advantage.

Security Strategy White Paper

The latest draft for our Security Strategy White Paper was presented. Discussion on the drivers for security in today's business environment identified four areas: audit, legal, policy, and technology. Representing these diagrammatically as four spokes with "Line Management & IT Security" at the hub, we have an inner circle. We can then create at least the start of an outer circle which includes business dependencies on information technology driving the demand for improved technology, business executives driving the legal area, and regulators driving the auditors. These spokes each  generate their own security view (perspective) which requires us to balance each view's competing demands and resolve each view's conflicts.

The technical principles in the strategy are currently the Jericho Forum commandments. These give rise to significant concerns over apparent naivety and in contradiction in some instances. Ian presented some Jericho Forum review materials on mapping, to indicate how members of the Jericho forum are interpreting these commandments. It was agreed that they do form a starting point for development of security principles in the Strategy White Paper.

Members received a presentation on the Jericho Forum positioning papers, which represent potentially valuable contributions to our Security Strategy White Paper. First versions of released papers are published on the Jericho Forum public web page. Other papers are in progress and proposed, and will be added to the released list as soon as they are available. The consumers of these papers are Jericho Forum followers. They are also aimed at informing the security vendor community of what kind of security solutions Jericho Forum followers want to buy for securing their de-perimeterized IT systems in future, in the hope that these vendors will be encouraged to develop such solutions. It was noted that if you can't effectively defend your perimeter then you must defend your data - so this approach aligns well with control of electronic assets, which is a major theme in our collaboration with the ABA Cyberlaw section.

From this discussion, members considered the opportunity to stage a security plenary meeting in our January 2007 (San Diego) conference, where we could follow on from the Jericho Forum's Seattle meeting (September 21-22) to stage a series of presentation on how the Security Forum embraces it. There are significant gaps in understanding between what technologists and business managers see. A plenary meeting comprising public informational sessions on security strategies and cross-functional impacts - based on security being the resolver for the different functional groups and interest areas (including lawyers, auditors, regulators, enterprise IT managers, legislators, e-Government) - would seem to appeal to a wide audience. We noted that the main driver for security budgets today is compliance concerns - not so much audit findings, but fear of being found deficient in compliance with seemingly ever-tighter audit metrics. If we take this approach too we need to remember the lessons learned from our Active Loss Prevention efforts several years ago, and generate a structure dialog which includes statement of work proposals that are architecture-related. The theme should be "work with us to achieve good things". Members took an action to explore this opportunity, recognizing the tight timescales we have to work to if we are to run such an event in January 2007.

An associated activity arising from this Security Strategy White Paper is our next collaboration with the ABA Cyberlaw section, to develop guidelines on Information/Data Management. Current trends in legislation indicate alignment with security of data rather than firewalled, perimeterized IT systems - secure data management. Members recognized that this discussion is more of a prospectus than what we really need here, which is a definition of what this would represent as a work item - deliverables, starting premises, and plan to engage the requisite resources to achieve the goal(s). However, the White Paper should include this as one of its outcomes, so our current focus should be to complete the White Paper.

Trust Models

Actions were agreed aimed at completing handover of this draft document to the Jericho Forum for integration into their Trust Models development project, which is expected to result in publication of an overarching Trust positioning paper, with subsidiary supporting trust models papers which will include the material compiled to date in this Security Forum draft.

Common Criteria Version 3

The Common Criteria Version 3 make significantly greater demands on vendors, and there is concern that these additional demands are disproportionate to the intent and need. The members heard a presentation that described what the presenter feels needs to change, and the opportunities for the Security Forum to make representations in support of these changes. Open standards are our core business, so we will evaluate the issues with a view to considering running an open meeting in the January 2007 San Diego meeting, to which we will invite people with interest in developing proposals for modifying the Common Criteria Version 3 so that they better reflect what the Common Criteria approach was originally intended to achieve, while reducing the currently excessive cost and resources that Version 3 requires to satisfy them. It is felt that The Open Group's neutral environment is a good place to conduct this evaluation and deliver high-quality recommendations.

Identity Management

The identity management projects are jointly addressed by members of the Security Forum with the Identity Management Forum. The whole Wednesday of the Security Forum meeting was devoted to participation in the Identity Management Forum agenda. See separate report.

Collaboration with the Jericho Forum

(A Jericho Forum member joined the meeting by teleconference for this item.)

Ian confirmed feedback from the Jericho Forum Board of Management that they are interested in collaborating with the Security Forum in three main areas:

  • Application of "Security in Data" components to the Jericho Forum security problem
  • Application of design patterns to the Jericho Forum security problem
  • Security Strategy White Paper & Jericho Forum Commandments

Additionally, the Jericho Forum's positioning papers provide interesting material for evaluation as contributions to the Security Forum's Strategy White Paper, while the Security Forum's Trust Models draft document is a significant contribution to the Jericho Forum's work on Trust Models.

Security in Data

The Security in Data slide presentation explains that the old model (security integrated into systems and applications) has failed, because systems and applications are too big and fragile, and security policy (and composition) has become intractable. What we should do instead is take security out of systems and applications, and put it into tiny, highly-assured appliances (call them Moates) in an environment where all traffic is routed through a single point (call this Wye), and invent a new set of system-design patterns which combine these appliances with security-free, general-purpose systems in new, secure ways. The presentation defined the characteristics and security assumptions of a High Assurance Security Appliance (HASA) and put it into context with a "protected system". It then considered the Multiple Independent Levels of Security (MILS) market, with its enterprise customer need for information assurance, and how we should expect that market to grow significantly over the next two-three years. We then considered key issues and implications of surrounding the integration of the MILS configuration with a HASA, then how this impacts the real-time Supervisory Control and Data Acquisition (SCADA) market, and finally how the SCADA environment fits with HASAs. It was agreed that a project along these lines is likely to be of interest to the Jericho Forum members:

  • It reduces the attack surface significantly.
  • Some major Jericho members operate very much in the SCADA environment.
  • The closer you get to the control point, the better is the security.

It was agreed we should include on the Jericho Forum Seattle meeting agenda an item to introduce this approach as a significant Jericho Forum area of interest.

Design Patterns

It was noted that our Security Design Patterns Catalog is deeply conservative in the traditional information security mould - if you use it you will arrive at something aligned with the old Orange/Red books. It assumes a design space that is tight compared with what secured devices demand in today's environment, and is tunnel-type - not aligned with the concept of using inherently secure protocols. It does not describe any patterns along the lines of security in data. Discussion on other books available on design patterns noted that Schumacher's later book shows less rigor than we demanded in our catalog, but we are content that the attention to detail in our catalog is crucial to the quality of the resulting pattern definitions. Even so, the consensus in the current patterns community is that less rigor is acceptable. If the Jericho Forum is to make a real impact on the security design community then we really need to express its principles (commandments) in a form that is concrete enough for design purposes, so we believe the Jericho Forum should be interested in developing  re-usable design patterns. Extending this argument - it is a logical extension of having working principles to articulate them in a formal definition process, and preferably one that is re-usable as a building block. It was agreed we should include on the Jericho Forum Seattle meeting agenda an item to introduce this approach as a significant Jericho Forum area of interest.

Security Strategy

For convenience and coherence of reporting, this is covered in the Security Strategy section  at the beginning of this Report.

In consideration of the Security Forum's vision for developing a mutually beneficial working relationship with members of the Jericho Forum, then depending on the Jericho Forum's response to these proposals, we will explore opportunities to  co-locate Security & Jericho Forums  members meetings in future.

Outputs

Achievement of all the objectives set out at the start of the meeting.

Next Steps

Progress all the actions arising from this meeting.

Links

See above.


   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page