You are here: The Open Group > The Open Group Conference - Boston 2010 > Proceedings
       

Security Forum

Objective of Meeting

The objectives of this meeting were to present, review, develop common understandings, and progress project development activities and deliverables, in the Security and Jericho Forums, addressing the following projects:
  • Automated Compliance Expert (ACE): review the draft Technical Standard
  • Identity and Access Management (IAM)
  • ISM3 Technical Standard: sanity-check on company review draft; preparations for launch; next steps
  • Architecting for Uncertainty: a joint workshop with the RT&ES Forum
  • Cloud/SOA Security: a joint workshop with the Cloud Computing Security Work Group
  • Enterprise Security Architecture (ESA) Guide
  • Secure Mobile Architecture: a joint RT&ES-Security Forums development workshop

Summary

Automated Compliance Expert (ACE)

The project leader gave a detailed run-through on the latest draft of the proposed ACE Technical Standard, and a number of queries were resolved which enabled members to approve preparation of the draft for company review. 

Assuming that the company review will result in approval to publish the ACE standard, members then considered preparations for launching this ACE standard so as to promote its visibility and high value to our primary target user community. A number of target user groups were identified.  We will review and refine these in engaging support from The Open Group marketing department, in parallel with the company review.

Identity and Access Management (IAM)

We reviewed the requirements recently evolved in the Jericho Forum and being developed by interested IAM members in the Security Forum.  Two key presentations were given:

These were used to exemplify the core issues being developed, which include extending the ISO Model to represent finer-grained controls as "entitlement", and to introduce access controls attached to the “resource" (target) in the form of "resource labels" and "access rules”.

Also, we are taking interest in a new technical Committee in OASIS, addressing “Identity in the Cloud”, and we are connected into the Cloud Security Alliance (CSA) in their development of the December 2009 CSA Guidelines v2.1 – domain 13: Identity & Access Management.

Further, members noted the recent release of the US (Howard Schmidt) document on National Strategy for Trusted Identities in Cyberspace (NSTIC), which we recognize as a landmark paper on “identity”.

Our core IAM developer members are continuing their work on refining their concepts, to resolve the contentious issues in these presentations, and will validate them with members as the work progresses, to produce a White Paper capturing these concepts in a manner which uses defined terminology in a consistent manner, and so sets a standard for defining effective IAM requirements that meet the needs for IAM in the Cloud and open-network (de-perimeterized) environments.  We aim for the resulting White Paper to be a stable platform from which effective Identity Management and Access Management solutions can be developed, and call in adoption of applicable existing standards as well as identify gaps in coverage by standards of common components of the solution space.

ISM3 Technical Standard

The ISM3 draft standard is now available for company review. The review period starts on July 26 and closes on August 22. Members reviewed the recent changes (those made over the past two months) to the document, in particular the addition of the Implementing ISM3 chapter and the commentary Appendix on how ISM3 and ISO 27000 coexist.

Thoughts on promoting ISM3 when we launch it as our ISM3 standard (assuming it successfully completes company review) include involving Open Group marketing, IPR from the ISM3 Consortium, and a program of Webcasts running ISM3 tutorials and related user-experience broadcasts.  An action was accepted to draw up a marketing strawman for review and development in preparation for the launch of ISM3.

In parallel with the company review, we will also consider best-value follow-up project development work to support adoption and growth of ISM3 in the marketplace.

Architecting for Uncertainty

Following up a request for a workshop with the RT&ES Forum to explore in detail the underlying concepts of a proposal aired by a member of the Security Forum for a new direction termed “Architecting for Uncertainty and Variance”, that member led a workshop (joint with the RT&ES Forum) in which he presented the concepts, which were appropriately aired and debated.  Members left the workshop with a better understanding of the concepts and a willingness to evaluate its proposals, with a view to arriving at a conclusion on their view of it as a valid approach for architecting security.  The outcome from this conclusion will influence how we take this concept forward.

Cloud/SOA Security

In a joint meeting session with the Cloud Computing “Cloud/SOA Security” Work Group, two members from this Work Group reviewed a presentation summarizing the goals, planned deliverables, and progress on developing this Work Group's deliverables.  The outcomes contributed to members' awareness of progress in this joint project and added interest in participating.

Enterprise Security Architecture (ESA) Guide

The web page for this project, including the project Charter specifying background information, objectives and deliverables, and the latest ESA draft document, are all available from the project web site.  Our consultant editor Gunnar Peterson and our Open Group member project manager joined this meeting session via conference call.  They conducted members through all the updated areas of the base document, noting areas for further change and update that will result in an ESA Update draft  that is acceptable for submission to formal review leading to approval for publication as a Technical Guide.  The target for progressing this updated ESA Guide to completion is to finalize the draft within two weeks, perform the formal review over the required three-week period, and so aim to be in a position to request approval to publish by mid-September 2010.

Secure Mobile Architecture

This was a joint meeting with the RT&ES Forum, whose members share a joint interest in developing a Secure Mobile Architecture standard, based on developing the SMA Technical Study which was published in February 2004.  In a joint RT&ES-Security Forums meeting on November 16-18, 2009, members of these two forums began joint work on a project aimed at analyzing the real requirements and audience(s) for an SMA standard.  The draft Charter, key descriptive presentations outlining the project objectives, and latest draft standard, are all available to members from the SMA project web page.

Members reviewed the latest SMA v0.6 draft standard – available to members from our project web site - and feedback was noted for updating it.

A number of members then volunteered action to contribute further work and write-ups for incorporation into the SMA draft.  The project leader and Open Group Security Forum director will coordinate these actions, with the aim of compiling an SMA draft standard that is 90% populated by the start of the next Open Group conference in Amsterdam (October 18-22, 2010).

Outputs

The objectives of the meeting were achieved. 

It is notable that progress on four main Security Forum projects has enabled members to anticipate that we will deliver four significant security publications in the period leading to the next Open Group conference:

  • FAIR Cookbook for ISO 27005 Technical Guide
  • ISM3 Technical Standard
  • ESA Technical Guide
  • ACE Technical Standard

Next Steps

Follow up on actions agreed in the meeting, and progress activities aimed at continuing development leading up to the next Open Group conference in Amsterdam (October 18-22, 2010).

Links

See above.


   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page