Home · About · A-Z Index · Search · Contacts · Press · Register · Login
    


Objective of Meeting
Summary
Outputs
Next Steps
Links

Sponsoring Forum:

Security

Meeting Report

Security Forum Meeting
held on
Tuesday/Wednesday 4th/5th February 2003

Objective of Meeting

Forum working sessions on:

  • Review approach to Managers Guide to Identity/Authentication
  • Finalize content for Managers Guide to Data Privacy
  • Complete Technical Guide to Security Design Patterns
  • Review proposed new security projects, including Security Architectures for Boundaryless Information Flow
  • Review protection profiles for Real-Time Security, jointly with the Real-Time Security Group

Summary

Due to certain key members needing to leave the conference early, it was necessary to re-schedule a Security Forum members-only meeting in parallel with:

  • the Real-time Security Group on Tuesday afternoon
  • the Identity Management meeting, all day on Wednesday 5th Feb.

The Security Forum is monitoring the RTES Security Group's activities on protection profiles, and regretted its inability to join them as planned.

The Security Forum is also an active participant in the Identity Management work, so this unfortunate scheduling clash required members to have to choose which of the 2 meetings to attend on the Wednesday, resulting in dilution of Security member involvement in both meetings. In the end however, only the work on RTES Security protection profiles and on the Managers Guide to Data Privacy suffered directly from this dilution, because the other Security Forum work was revisited on Thursday and Friday.

Review Protection Profiles for Real-Time Security

Due to a late change to the Security Forum agenda which forced a meeting scheduling conflict, the Security Forum was unable to join with the Real-Time Security Group on the Tuesday afternoon to engage in their meeting on their current draft restricted-kernel Protection Profile. This profile had been made available efore the Burlingame meeting to Security Forum members, for their review in preparation for this meeting.

Security Forum members will review the report and revised deliverables resulting from this RTES Security Group meeting, and will engage in joint future review activities as appropriate.

Managers Guide to Identity/Authentication

Steve Mathews (Articsoft) is contributing this Guide. On Tuesday afternoon (16.00-17.30) he presented his proposal for the structure and approach to writing it.

In his introduction slides, Steve described the background and approach he has developed in discussion to date with Ian Dobson. The issues surrounding authentication are about span of control and ability to rely upon information on which you place reliance. The current PKI technology has been developed around the concept of being able to authenticate the identity of entities – people, machines, information. But PKI is not the only variant in town, although the name is well recognized security practitioners and is generally accepted by major suppliers. The objective of this Guide is to bring out the main issues that will enable non-technical business managers to understand what PKI and alternative solutions can (and can not) deliver as business benefits to their IT operations.

Steve plans to describe this using scenarios that show authentication, and then develop from these the prime business purposes it serves, and how PKI can do it and the commonest alternative ways to do what is needed. The scenarios he proposes to use are:

  • Accessing a computer
  • Sending confidential e-mail or files
  • Gaining access to a remote computer or network
  • Protecting a file on a local computer
  • Making an Internet purchase
  • Approving an expense request
  • Witnessing a contract
  • PKI identity registration
  • Other identity registration

Discussion brought out a variety of points, mainly on the meaning and implications in Steve's diagrammatic scenarios. Overall, his approach and direction was endorsed by the Security Forum members. Steve took away the feedback and will proceed with developing the content of this Guide around these scenarios.

Managers Guide to Data Privacy

Steve Jenkins (NASA JPL) led a review of the latest draft (which he circulated on 18th Dec 2002), including with one of the original authors (Bob Blakley) but without our Security Guides series editor (Eliot Solomon). Edits were annotated into the draft text viewed by all via the A/V meeting projector. Much of the discussion was spent considering the desired content and coverage that should appear under the placeholder headings towards the end of the existing draft, checking back to the existing content in the earlier sections to ensure we maintain consistency in our approach.

Steve undertook to translate the marked-up annotation into text to produce a completed draft of this guide, by the end of February. It will then be made available for review by the Security Forum membership, with the objective of completing the final version for publication by the end of March 2003.

Technical Guide to Security Design Patterns

The detailed edits to this document are held by Bob Blakley (IBM/Tivoli). Ian and Bob agreed a meeting in the week beginning 17th February, when they will collate all these detailed edits and assemble a complete draft for this technical guide. It will then be presented for review by the Security Forum and our associated group of design patterns experts.

Proposed New Security Forum Projects

In response to a discussion in the Security Forum steering committee on proposed new projects that the Security Forum can undertake to raise our value proposition:

  • Terry Blevins (CIO, The Open Group) and Eliot Solomon have encouraged all Forums to work on Architectures for Boundaryless Information Flow - see the Plenary meeting report on their presentation held on Tuesday AM.
  • Steve Whitlock (Boeing) submitted suggested several work items that align with Ian Dobson's call for project proposals that represent technical contributions towards solving real IT security pain-points that IT-enabled businesses commonly share.

We held several discussions on the proposal to work on security architectures for Boundaryless Information Flow, on Wednesday and Thursday, and these culminated in agreement in a final meeting session on Friday to undertake a project on this. The report is linked to the Security Forum's Friday AM meeting.

Steve Whitlock's new work proposals were discussed in turn:

  • PKI: Guide to Trust Models
    A Guide to Trust Models - for business-2-business, non-prescriptive, listing the pros and cons (including expectations, & the consequences of an party not fulfilling their responsibilities) that have to be weighed when deciding what trust levels your business needs, and giving usage examples. It should include bridge CAs, cross-certification, and how SAML can contribute to the solution space. Discussion rated this as NYS (worth further consideration).
  • Middleware: SAML interoperability, & Web Services Security
    Discussion concluded that the SAML specification leaves so little room for mis-interpretation as to render interoperability test & certification/branding unnecessary. However, an architectural/analytical guide to Web Services would have merit, so was rated NYS (worth further consideration).
  • Some Deliverable to help make Role Based Access Control a reality
    There is a big gap between the theory (many publications, e.g from NIST) and the real world. This problem focuses on access control, which spans identity, role, and policy. Roles can be administrative or operative (computed on the fly). It was suggested that use of SAML is likely to lead to a richer solution because it would decompose the problem space well. We could perhaps work on a model for roles and the choices that need to be made. Overall rated as HDNYS (highly definitely worth further consideration).
  • Perimeter Security outside the Desktop
    The domain perimeter is becoming "soft", to the point where internal networks need to be treated as insecure. This pain-point would address how to manage the security for individual machines when the perimeter is outside the desktop. The ultimate solution would seem to be to move security to the data. Discussion rated this as DNYS (definitely worth further consideration).
  • Baseline Security Standard improve security level
    Steve characterized this as an initiative to move the bar so that the overall level of security for BSS-conformant systems is improved. He envisaged that for not too much effort in revising our XBSS standard we could contribute significant new value. Part of the EU privacy requirements depends on a secure environment, and a BSS-conformant system would support and simplify security audits for insurance, etc. XBSS would need a significant revision, to include networking, and a new elevator pitch, plus leveraging through the ALPI. IanD proposed discussing this further with Nick Mansfield. Discussion rated this as DNYS (definitely worth further consideration).
  • Security for laptops
    A Secure Configuration Guide, explaining how to secure a laptop for executives on the move, with one log-in. It would need transparent encryption, and lock by absence (some proximity device - Bluetooth?,  Smart-Card). Discussion rated this as DNYS (definitely worth further consideration).

It was agreed that the proposals that achieved *NYS status would be further reviewed and discussed in teleconferences between this and the next meeting.

Outputs

Agreement on the approach to writing our Managers Guide to Identity/Authentication; feedback on the proposed scenarios; approval to proceed with writing the 1st draft in line with the meeting comments on the approach and scenarios.

Agreement on the content of the complete Managers Guide to Data Privacy and on a schedule to complete a draft for review.

Arrangements to collate the existing detailed edits on the Technical Guide to Security Design Patterns, into a complete draft for formal review.

Agreement to further review Steve Whitlock's proposals for new projects, in   teleconferences between this and the next meeting.

Next Steps

Review Protection Profiles for Real-Time Security

Action: Security Forum members to review the report and revised deliverables resulting from the Burlingame RTES Security Group meeting, and to engage in joint future review activities as appropriate.

Managers Guide to Identity/Authentication

Action: Steve Mathews to take away the feedback from his presentation at this Burlingame meeting and develop a 1st draft of this Guide, by end Feb'03.

Managers Guide to Data Privacy

Action: Steve Jenkins to produce a completed draft, by the end of February.
Action: Security Forum members to do formal review during 1st half of March'03.
Action: Ian Dobson to deliver final version for publication by end March'03.

Technical Guide to Security Design Patterns

Action: Bob Blakley will work with Ian Dobson to collate the numerous existing edits already agreed on this document, and deliver a completed draft by end Feb'03
Action: Security Forum to conduct formal review through early March'03.

Proposed New Security Forum Projects

Action: Security Forum to review Steve Whitlock's proposals for new projects in preparation for discussion in teleconferences between this and the next meeting. See also the link to the Security Forum's Friday AM meeting for action on security architectures for boundaryless information flow.

Links

Slide presentations on the Managers Guide to Identity/Authentication cover the introduction and the scenarios.

The latest draft of the Managers Guide to Data Privacy is available from http://www.opengroup.org/projects/guides

Progress on the Technical Guide to Security Design Patterns can be followed at  http://www.opengroup.org/projects/sec-des-pat

Proposed New Security Forum Projects from Steve Whitlock are outlined in his presentation


Home · Contacts · Legal · Copyright · Members · News
© The Open Group 1995-2012  Updated on Tuesday, 25 March 2003