You are here: The Open Group > The Open Group Conference - Hong Kong 2009 > Proceedings
       

Security Forum

Objective of Meeting

To present, review, and develop common understandings, and progress project deliverables in the Security, Jericho, and Real-Time Forums, with particular focus on:

Summary

Welcome

The Open Group meeting hosts:

  • Jim Hietala, VP Security
  • Ian Dobson, Director, Security and Jericho Forums
  • Joe Bergmann, Director, Real-Time & Embedded Systems Forum

welcomed attendees to this Security Forum meeting in Hong Kong.

Review of Malware Industry & Threat Landscape in China

In a follow-up to his presentation in the Security Track of the Plenary, guest speaker Wei Zhao (CTO, Known Security) gave attendees an online guided tour through the main malware web sites currently operating in China, demonstrating how they operate and how his Known Security company detects and raises alerts to the threats that these sites and their operators pose to the rapidly growing numbers of Internet users in China.  Much of Wei Zhao's guided tour involved visits to his company's privileged-access web sites. 

Overview of The Open Group Security Programs

Ian Dobson gave a presentation explaining the origins, achievements, current activities, and future plans of members of the Jericho Forum.

Jim Hietala then gave a presentation on the Security Forum, covering similar ground.

Joe Bergmann then followed with an in-depth presentation on the current focus of development work in High Assurance and Multiple Independent Levels of Security (MILS) that is underway in the Real-Time and Embedded Systems Forum.

Digital Access Management (DAM)

Security Forum Vice-Chair Stephen Whitlock (Boeing) gave a presentation on the value of information, how it can be stolen with relative ease unless it is properly protected, what protection methods exist, why rights management is the direction he believes we need to follow, and how this can be achieved through developing a rights management standard along with a standard defining meta-information for access control and information descriptors.  His conclusions are that we need to:

  • Develop DAM standards that include an Information Container, Programming Interfaces, and Rights Management Protocols
  • Create an enterprise-to-enterprise information meta-model that is usable and scalable, supports business collaboration, and follows a complete information workflow lifecycle

Secure Cloud Computing

Ian Dobson gave a presentation on the Jericho Forum's approach to security Cloud Computing, including why their members consider this a high-value area to make secure for business collaborations, and describing the Cloud Cube Model to explain the different security considerations that apply to different types of Cloud Computing.  Jericho Forum members have made contributions to the Cloud Security Alliance's working groups which are developing a CSA Guide Version 2, due to be published before the end of 2009.

Jim Hietala then gave a presentation explaining The Open Group member's interest in Cloud Computing, their coverage of this topic in our Conferences in April and July 2009, The Open Group Board's Cloud Strategy paper, and the formation in July 2009 of The Open Group Cloud Computing Working Group (CCWG), which is now being consolidated into a focused program of work.  Members of the CCWG have also made informal contributions to the Cloud Security Alliance's working groups.

Ecosystem for Security

Ian Dobson gave a presentation describing the objectives of this Security Forum project, to explain the basic information security measures that users of IT systems with no professionally trained security specialists – particularly in small and medium business enterprises – can use to set up their IT systems in ways that make them acceptably secure for business collaborations with larger enterprises, and so make them more acceptable as business partners.

Governance, Risk, Compliance, and Audit (GRCA)

Jim Hietala gave a presentation reviewing current Security Forum work activities in these areas. He listed the main challenges in each of these areas, then explained our projects addressing:

  • Risk Management – publication of our Risk Taxonomy standard, and our Risk Assessment Methodologies Guide, and our forthcoming Risk Assessment Cookbook for all methodologies
  • Compliance – our Automated Compliance Expert standard, which uses an XML-based mark-up language (ACEML) to establish compliance requirements in systems and then monitors the system to alert for any item which drifts outside the required compliance
  • Audit – our update to our earlier Open Group Audit & Logging (XDAS) publication; this update will provide a standard event format and make audit records more descriptive and easier to consume; we are also working with MITRE on development of their Common Events Expression (CEE) project, our aim being to align XDAS with and complement CEE

Outputs

The objectives of the meeting were achieved.

Next Steps

Follow up on the guests attending this meeting, to develop their involvement in the directions they indicated.

Links

See above.


   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page