Objective of Meeting
Summary
Outputs
Next Steps
Links

 


Sponsoring Forum(s)

Security


Security Forum [October 23]

Objective of Meeting

Security Forum members review, awareness, validation, and progression of Forum projects:

  • Managers Guides - Identity Theft; Identity, & Authentication
  • Security Architectures - Technical Guide to Trust Models
  • Presentation from the Black Forest Group on PKI Certificates - Richard Lee
  • Project ALPINE status report
  • Security Forum Future Planning

This meeting was scheduled to continue on Friday (Oct 24) but we closed at the end of Thursday (Oct 23).

Summary

Manager's Guides

The Guide to Identity & Authentication has remained at the same draft level as was presented in the Boston (July 2003) meeting. To stimulate progress, Ian had proposed (email dated Oct 4th) a re-think on the overall structure and content of Part 1 of this document. Eliot - as the editor-owner of the Guide - was not impressed. In discussion, we went through Ian's proposed revision, and revisited the history and origins of this project, to establish how we got to the present position and so make an informed decision on how to move forward to complete this Guide. The discussion revealed significant differences in understanding of both what Identity is and how we should explain it in this Guide. Bob Blakley noted that it had taken the US National Academy of Sciences 18 months to get it right, and he offered the URL for the definitive NAS document on this subject - "Authentication Technologies and their Privacy Implications", which contains an extensive discussion of identity: http://www.nap.edu/catalog/10656.html. The definitions begin on page 18: http://books.nap.edu/books/0309088968/html/18.html#page . Bob also circulated a URL for relevant CSIS information on authentication - http://csis.org/tech/authentication/0305_authentication.pdf . All recognized that the issues surrounding Identity are complex but this is why there is so much value in writing our Manager's Guide - to cut through the misconceptions and present the key issues in the information security context. The conclusion of this review session was that Eliot will take all the present input - including Ian's comments and Bob's references - and produce a new draft for review.

The Identity Theft project was begun in this meeting, its Terms of Reference having been approved in the Boston (July 2003) meeting. Initial discussion suggested that we should not proceed, questioning its value (is it just media hype?) and our competence to do an acceptable job on it. Bob Blakley (champion of the project) explained that the issue we will address is not duped users, rather it is to reduce enterprise exposure to risk of theft of holding private identity data. It was agreed we need to carefully define our audience and our objectives. However, before we even get to that stage we need to do the analysis work - (phase 1 in the project's terms of reference - see the members-only web area, projects & plans). The vast majority of those present supported proceeding with phase 1. Mike Jerbic reminded members that we need to ask two essential questions when embarking on every project:

  • Who is willing to contribute work on it?
  • Does it add sufficient value to justify doing the work?

Responses were affirmative to both questions. It was agreed we will work to complete phase 1 - information gathering, to identify a set of documented cases of identity theft and investigate these cases in detail, the objective being to identify how an identity is stolen, how a stolen identity is used, how identity theft is detected, and how the victim of identity theft demonstrates that identity theft has occurred - by the time we go into the next meeting (San Diego, 2-6 February 2004). In the next meeting we will evaluate progress and have a checkpoint then on how to continue. We will also inform the IdM joint project members about this Security Forum project.

Security Architectures

Eliot Solomon noted that in the Boston (July 2003) meeting we identified six architecture models to be used to describe architectural views, one view being security, and we also used a questionnaire to start drawing out the security view for one of those six models. In the same meeting, Steve Whitlock made a start on leading the Trust Models project - aimed at producing a technical guide for IT architects and system designers. He proposed we work on this in this security architectures session. This was agreed.

We projected Steve's latest draft (25th Sept) and worked through his template and his PKI example of a filled-out template, bearing in mind Steve's caveat that this represents his first draft and not an item of work he considers is complete. Ian recorded the extensive feedback, and will pass this to Steve (who was absent during this agenda item) for his consideration and feedback.

An additional action is for other members to volunteer to create more trust model examples.

Presentation on Business Requirements for PKI Certificates

Rich Lee, who met with some Security Forum members over a lunch in the Boston meeting, gave a presentation (copy of slides is yet to be provided) on the technical requirements on business that PKI certificates represent. He began with a brief history of the origins of the Black Forest Group, and described it now as a trade organization that keeps itself exclusive to invited CxOs. Their interests are to leverage experience shared between members at CxO level. Their focus is still on emerging IT, but with a firm bias towards business issues, so they have a different perspective now compared to when they originated.

Rich Lee then presented the BFG's business requirements for PKI. Having recognized their business needs, including for pervasive secure interoperability, for a common cohesive PKI framework, they decided that security should enable management of liability. Representations of interoperability can be made and accepted. The three key requirements they concluded come out of this were liability allocation, distributed validation, and end-user accountability. This led to a business assessment that current PKI products fall short of requirements in four areas - distorted intermedia liability, processing of certificate policies, complex and costly management, and vulnerability of underlying platforms.

They therefore set out to address these shortcomings. Their solutions include a composite certificate quality attribute. They also wanted a flexible hierarchy structure, reflecting the distributed nature of the process, and accept the minimum. This permits the customer to choose chain components, which in turn gave rise to the Black Forest Group's PKI framework. Rich went on to talk about their future PKI direction for certificate validation- validation process, endpoint security interests, and the business applicability of PKI technologies - architectural longevity, etc.

Rich's conclusions were that there is significant IT consumer support for individual accountability (the trusted workstation) and also industry support for distributed validation. In discussion on trusted workstations, Eliot observed that trustworthiness of the application has use in the financial industry's controlled distribution of protected market data, and has DRM-type affinity with the recording industry. Also we should think about scalability in a counting-down credential - is it the responsibility of the business not the certificate to decide? Rich said he has a relevant paper on this, titled "Insurable e-Commerce Framework", which he will share with the Security Forum. Further discussion involved thinking on proof of concept, root CAs, injection of code, and Microsoft use of timestamp and hash. Rich said that he would refer these more technical questions to Roger Schell (roger.schell@aesec.com), and it was agreed that Ian and Rich will explore the opportunity to invite Roger Schell to our next Security Forum meeting to explore these questions.

Project ALPINE Status Report

Ian gave a status report presentation on the ALPINE project, then displayed a tour round the ALPINE web pages to show how to access the five documents being created under this European Commission project.

Future Plans

In this session, the Security Forum review all its current projects to validate in each instance their continuation and update their resources, deliverables, and timescales.

EVM project - this will continue, including with the ASC RPI, NIST, and the EOIF, as agreed in the Security Forum meeting report for Tuesday.

IdM joint project - this will continue, with contributions to complete the Identity Management White Paper.

Manager's Guide to Identity & Authentication will continue.

The Identity Theft phase 1 activity will be done by the next meeting, and we will use the next meeting as a checkpoint for continuation.

The Technical Guide to Trust Models will continue as planned.

The Security Architectures project will continue.

The Security Forum members will participate in the Company Review of the Secure Mobile Architecture document.

The Security Forum will continue to monitor and provide feedback on the Messaging Forum's secure messaging project.

The Security Forum's agenda for the next meeting (San Diego, 2-6 Feb 2004) is very likely to include:

  • EVMi (1 day)
  • Project reviews
    • Identity and Authentication
    • Identity Theft Phase 1
    • PKI Trust Models
  • Security Architectures
  • Progress Identity Management
  • Progress Secure Messaging

Outputs

Information, awareness, validation, and agreement on all the meeting objectives.

Next Steps

Actions as identified in the Summary and Outputs sections of this Meeting Report.

Links

See above.


Home · Contacts · Legal · Copyright · Members · News
© The Open Group 1995-2012  Updated on Wednesday, 29 October 2003