You are here: The Open Group > Enterprise Architecture Practitioners Conference Budapest 2007 > Proceedings
       

Enterprise Architecture Practitioners Conference
Plenary and Conference Streams

Objective of Meeting

The Enterprise Architecture Practitioners Conferences are organized by enterprise architecture practitioners, for enterprise architecture practitioners, and for those directly involved in the management and oversight of enterprise architecture.

The Enterprise Architecture Practitioners Conference at Budapest addressed some of the key issues and challenges that face enterprise architects today, with a specific focus on Secure Architectures.

In this highly practical three-day conference and series of workshops, members of The Open Group and non-members alike came together to share insights and perspectives on best practices in enterprise architecture, and the key issues and challenges that enterprise architects face today.

The conference underlined the continuing role of The Open Group in providing a truly global forum in which enterprise architects from all sectors of the industry can come together to discuss best practice in enterprise architecture, hone their skills, find new ways to solve problems, share experiences, and learn from each other.

Summary

The agenda for this Enterprise Architecture Practitioners Conference covered 52 individual presentations, structured into a plenary plus 15 streams across up to three parallel tracks.

The conference plenary focused on major security-related issues and challenges that face Enterprise Security Architects today and in the near future. 

The security theme was continued in six security-related APC tracks on Tuesday and Wednesday comprising 14 presentations, along with nine other enterprise architecture tracks comprising 30 presentations. These tracks provided innovative viewpoints, practical insights, and case study presentations, from a diverse range of enterprise architecture professionals from both vendor and customer organizations, into the approaches and methods that have proved most effective for developing enterprise architectures.

The presentations referenced below are freely available only to members of The Open Group and conference attendees.

Day 1 – Opening Plenary: Secure Architectures

The conference plenary focused on major security-related issues and challenges that face Enterprise Security Architects today and in the near future.

Allen Brown, President & CEO, The Open Group, gave opening remarks – touching on The Open Group’s history with security dating back to the 1980s. In particular, Allen highlighted the work of The Open Group Security Forum, which has been focusing on industry security concerns for a number of years,  supporting The Open Group vision of Boundaryless Information Flow™. 

Stephen T. Whitlock, Chief Security Architect, Information Security, The Boeing Company, gave the opening Keynote Presentation: New Approaches to Infrastructure for Secure Computing. Steve has been a leading member of the Security Forum since the mid 1990s.  His presentation, “Striking at the Root”, covered new approaches to infrastructure for secure computing.  Specifically, he identified several key issues within today’s enterprise – namely, shifts in value, employee and non-employee populations who are granted access to an organization's systems, a global regulations proliferation, and technology gaps, among others. He then presented a snapshot of The Boeing Company's security strategies – pointing out their future infrastructure security services, and their information-centric future for access control.  He also shared an industry security technology scorecard, broken down by information protection services, privilege management infrastructure, and infrastructure protection services.  He summarized his vision of the future direction for access control in what he called “Whitlock’s Laws for Access”, namely, access that is policy-driven, automated, disintermediated, standardized, and integrated.

Andras Szakal, Distinguished Engineer, Software Group, IBM, then spoke about the need for developing architectural capabilities to design secure systems in a rapidly changing world – the market drivers and the move to SOA, global security challenges and awareness, operational security challenges, the security lifecycle, secure construction, and the need for highly qualified architects to design the secure systems that business will increasingly demand.  He spoke about how IT product assurance is directly linked to supplier assurance – and that, without a secure supply chain, an organization’s reputation is quickly put at risk. Supply chain security challenges can also escalate customer safety concerns and the potential for revenue loss; Andras illustrated this position by providing recent examples of Mattel’s toy recall, the misperception that Lenovo provided less secure products than its predecessor, and Starbucks' focus on guarding its supply chain from narcotics trafficking.  He saw the growing security community as the positive response to the host of attack vectors that will never go away. Andras' presentation is available here.

Allen Brown then announced the formation of a new franchise in France to be spearheaded by Eric Boulay, Président Directeur Général, Arismore.  Allen introduced Eric, who then discussed the opportunities to share The Open Group’s vision of Boundaryless Information Flow™ with the French community.  For more information on this new franchise, please visit The Open Group website.

Stephen Farrell, Research Fellow & Lecturer, Trinity College, Dublin, Ireland, gave a presentation on security boundaries and surfaces.  He characterized his presentation by saying that there are so many different security boundaries in-play nowadays that new types of security architecture and analysis may be needed, and although we don’t have much new so far, he’ll look at some security boundaries from the metal on up, and show us what he has found. There are many "side channels" – especially USB devices – where data leakage can easily happen. Virtualization creates new boundaries but involves new hidden boundaries. Host security – including security of the end systems, software updates or what is actually (supposed to be) running on a particular box, mobility, and more –  all present problems to be managed. Steve commented that, even with excellent, controlled software updates, there are still potential side-effects, and he used a Skype incident as an example. He discussed the security boundary when dealing with "middle boxes", and protocol oddities including UDP-Lite and delay and disruption-tolerant networking (DTN), which aims to ensure that data flows even if there is never any end-to-end connection. Steve also reminded the audience that DTN works when transmission control protocol (TCP) breaks, and he noted that security boundaries become much more broadly used in a Web 2.0 environment or organization, and discussed a number of specific Web 2.0 security issues, including malware distribution via server compromise, JavaScript vulnerabilities, and the security of “mashups”. His general conclusions were that we will be wise to consider the all various boundaries when doing threat analysis, and try to reduce the attack surface in whatever way we can. Stephen's presentation is available here.

Allen Brown and Phil Stauskas, Distinguished Engineer & Worldwide IT Specialist Profession Executive, IBM, then gave a brief overview of the recently announced IT Specialist Certification (ITSC) program.  Phil also discussed the importance of consistency within the IT Specialist profession – especially when it comes to IT implementations – and how this ITSC program will provide assurance that those certified will not only write good code but they'll also possess necessary associated professional skills, including in communication.

Merike Kaeo, Consultant, Double Shot Security and IPv6 Forum Fellow, spoke about what is meant by securing the network, and imperatives in transitioning to IPv6 – the need to design security into IPv6 networks that do not blindly mimic the current IPv4 architectures but also don’t break working v4 infrastructures; the need to guard against re-architecting in ways which place limitations on IPv6 capabilities; the need to re-visit your security policy in the light of IPv6 capabilities and your current risk profile; and the need to ensure that your security policy is allowed to dictate which security measures to implement. Merike highlighted the main similarities (Security Properties, Security Services) and differences (Protocol Operation, More Automation, Scalable Mobile Hosts, Potential Application Integration) between IPv4 and IPv6, and went on to discuss the considerations that arise from these differences. She described a sample IPv6 architecture, highlighting key considerations including addressing/naming, native routing versus tunnels, management, and security.  Merike also delved into SeND (Secure Neighbor Discovery) and how it protects against spoofed messages, neighbor unreachability detection failure, duplicated address detection, as well as attacks on DoS, router solicitation and advertisement, replay, and neighbor discovery DoS attacks. She went on to discuss Tunneling issues, Networking Address Translation issues, IPv6 security enhancements, and the significant interplay considerations between IPSec and IPv6. She then moved on to wider considerations in a hybrid security model which provides defense in depth, facilitates a gradual move to native IPv6, maintains existing policy controls, and allows for performance versus management trade-offs. Merike's main conclusions were that there are many similar issues for security regardless of using IPv4 or IPv6, that security policies may need to be modified to enable end-to-end encryption, that there are greater security efficiencies to be gained from IPv6 if IPv4 security architectures are not blindly mimicked (reduce use of NAT), that distributed security management is essential, and that when implementing IPv6 we should include identifying actual versus perceived risks when deploying IPsec security services so that we use IPsec effectively. Merike's presentation is available here.

Adrian Seccombe, CISO & Senior Enterprise Architect, Eli Lilly, discussed the evolution from reactive information security to integrated information security.  Homing in on three key questions, Adrian addressed what is driving the change of traditional information security towards more integrated information quality management systems, asking if there are any signposts that can help point the way from history or nature or other industries, and given these pointers how people should respond to this changing environment.  He also identified a series of change drivers, such as radicalizations and changing tensions. He illustrated his points about measures needing to be proven as effective by using historical examples such as the Great Wall of China (march round rather than over), and other examples of leading indicators that can be found in the banking, pharmaceutical, and petroleum industries. Adrian recommended that our responses to these challenges should include at their core Openness and Transparency as the best forms of defense against the weight of regulations and other legal burdens; Partnering with Government, Customers, and your competition on the non-competitive aspects of your industry (The Open Group Forums are a great example of this); and by customers and vendors working together we can also ensure the user and supplier sides best understand each other. The Jericho Forum shares this approach, aiming to establish effective business collaboration through understanding the essential components in this framework, and calling for open standards-based solutions which will assure interoperable solutions which deliver this vision. Adrian's presentation is available here.

Guy Bunker, Chief Scientist, Symantec Corporation, reviewed the challenges that security architects have today and examined some of the new skills they will need to be a success. The pressure to provide protection against ever-increasing threats is on, and due to regulatory measures is now high on agendas in company boardrooms. There are new threats emerging all the time, and new reports of cybercrime occurring daily, with resulting costs amounting to rapidly increasing financial burdens. A sound security policy has to be at the core of our responses, guiding our security strategies. A key solution area is good governance, and an essential focus is compliance to the applicable regulations as well as implementation of best practice. We also need to keep our focus on what is important – our business information and its management.  Our data in today's systems is often decentralized, unstructured, and essentially everywhere. Guy offered statistics associated with at-risk data – around 6 million laptops (and more importantly the data stored on them) per year are lost, and mobile devices are 22 times more likely to be lost. iPODs and USB devices are rapidly becoming the major way that information is "lost".  The advent of SOA as today's apparently preferred architecture of choice will only make the problem harder to manage. He summed up the presentation by outlining new required skills for secure architects, including understanding the business, business functions, legal aspects, financial aspects, implications of decisions, consequences of no decision, and the impact of new technology.  Contrary to the popular belief, “Ignorance is Not Bliss” in the world of security. You must understand the business to drive it successfully, and this means recognizing that the perimeter has gone (risk follows information not systems), information security is the primary requirement, and you need to do more than influence governance and compliance – you need to drive it. Guy's presentation is available here.

Allen Brown formally announced that HSBC – the third largest bank in the world – has taken up platinum membership status within The Open Group. He welcomed Chris Woods, HSBC to the conference.

Carl Ellison, Architect, Microsoft Corporation, gave a presentation on ceremony flaws in otherwise secure protocols. He called his presentation “Ceremony Design and Analysis”.  Carl defined his use of the word "ceremony", then gave a tutorial on how the inherently secure technology (TLS) design for access to a web page could be broken by an attacker intervening in the people and process parts of the overall activity. The point of this exercise was to demonstrate that secure design must include the complete transaction, including the User Interface (UI) design for the people and process parts of the whole activity.  The whole problem is not helped by the fact that technologists design their secure technologies separated from the UI engineers who then design the interfaces to the technology, without understanding how the UI design can completely undermine the effective security of the resulting product design. Typical UI designers tend to concentrate on beauty and special effects, while protocol designers and system programmers and especially cryptographers tend to be very poor UI designers.  However, for ceremony design, UI must be part of the design and analysis along with the technology – an interdisciplinary team for UI and technology is a requirement, not a luxury. Ceremonies covers the whole design (nothing important is out-of-band), and all protocol analysis techniques apply (security, performance, fault-tolerance, deadlock, race, realizability, formal methods, etc.). Carl's concept of "ceremonies" covers the whole design. All protocol analysis techniques will work on designing ceremonies, and while the design is yours, you must learn the programming for the human nodes part of that design or ensure you design around these human nodes. This field is often not considered properly today – it is a major failure in our design of secure systems, and is wide open for both invention and analysis. Carl recommended reading his Cryptology ePrint Archive: Report 2007/399 to get further information on this subject. Carl's presentation is available here.

Chris Forde, VP Technology Integrator, American Express and Chair of The Open Group Architecture Forum, then discussed with Allen Brown in the role of interviewer the current and evolving work in the Architecture Forum.  Chris described his perceptions on the benefits of membership and involvement in this Forum. In particular, American Express has benefited from identifying best practices that were used by other Open Group member companies. He also mentioned the Architecture Forum’s work on updating the current architecture framework specification, and a snapshot of their focus in 2008.  He called for more white papers from other Open Group members on the best way to implement a secure architecture.  Chris also reiterated the importance of approaching security as an integral part of the architecture process – it cannot be successfully addressed as an add-on, so it must be made a priority.

Lauren States, Vice President, Client Value Initiative, IBM, gave the Closing Keynote in this Secure Architectures plenary day. Lauren noted that many companies today are focused on meeting business growth and business agility needs, and like IBM they all see that the need for certified IT architects is a critical success factor in the multi-disciplinary skills development of IT architects, and is also an inherent component in meeting the demand in IBM as well as other IT organizations for these skills. People with the right skills are an essential part of the value proposition in transforming a business – regardless of what the business is. IBM is pleased to continue its program of support and development of The Open Group ITAC and AOGEA programs which provide a valuable delivery channel for the development, certification, and continued maintenance of the IT architect profession.

Days 2 & 3 – Conference Streams

The conference streams at Budapest provided experience-based insight into the approaches and methods that have proved most effective for developing architectures, in all continents of the world.

The security theme was continued in six security-related APC tracks on Tuesday and Wednesday comprising 14 presentations, along with nine other enterprise architecture tracks comprising 30 presentations. These tracks provided innovative viewpoints, practical insights, discussions on best practices, interactive workshops, case study presentations, and demonstrations of the latest tools. They were delivered by a diverse range of enterprise architecture professionals from vendor and customer types of organizations.

STREAM #1: Identity, Federation, & Access Management
STREAM #2: TOGAF™ Case Studies
STREAM #3: Enterprise Architecture Best Practice Management
STREAM #4: Architectures for Secure Data Management
STREAM #5: TOGAF™ Tutorials
STREAM #6: IT Architect Certification (ITAC)
STREAM #7: Secure Architectures & Governance
STREAM #8: Enterprise Architecture Development
STREAM #9: Architecting Secure Communications
STREAM #10: Architecting Trust
STREAM #11: Information Architecture
STREAM 12: Enterprise Architecture Case Studies
STREAM 13: Securing your SOA Environment
STREAM 14: Service Oriented Architecture
STREAM 15: Business Architecture

Outputs

The presentations, tutorials, and workshops at the meeting, and associated discussions and panel sessions, all provided participants with a wealth of experience-based insights into current best practice in enterprise architecture, and particularly on architecting security, from leading experts and practitioners around the world.

Participants at this event were able to:

  • Participate in highly practical workshops and tutorials teaching best enterprise architecture practices
  • Review case studies from organizations who have put theory into practice, and learn from them what works and what doesn't
  • See demonstrations and presentations on leading tools supporting open architecture methods
  • Network with leading architecture experts, vendors, and peers in the enterprise architecture field

Next Steps

This Sixteenth Enterprise Architecture Practitioners Conference was a great success, confirming the global need for this unique series of events.

The next Enterprise Architecture Practitioners Conferences will be held in San Francisco, USA, January 28-30, in association with The Open Group Member Meetings, January 28-February 1. 

If you are interested in presenting at San Francisco, or at other Enterprise Architecture Practitioners' Conferences in 2008, then please contact John Spencer, APC Manager at The Open Group.

Links


   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page