Home · About · A-Z Index · Search · Contacts · Press · Register · Login
    


Objective of Meeting
Summary
Outputs
Next Steps
Links

Sponsoring Forum(s)

Security


Meeting Report

Security Forum Meeting
held on
Thursday 6th February 2003

Objective of Meeting

The topics covered by the Security Forum during the Thursday covered:

  • Presentation by Mike Jerbic (Trusted Systems Consulting Group) on Security Requirements in the Life Sciences (Biotechnical) Industry
  • Secure Mobile Requirements in the Secure Mobile Architecture (SMA) - joint session with the Mobile Management Forum
  • Extensions to Identity Management Business Scenario
  • Managers Guide to Secure Email
  • White Paper on Access Control
  • Review of Security Forum Roadmap & Future Work Plans

Summary

Security Requirements in the Life Sciences (Biotechnical) Industry

Ian Dobson introduced new member Mike Jerbic, who is developing a liaison with the I3C (Interoperable Informatics Infrastructure Consortium), and is contributing a presentation on Security Regulations and Requirements for the Life Sciences (biotech – I3C) industry.

In his presentation, Mike addressed the following areas:

  • Security drivers and threats in the drug development industry
  • FDA (US Food & Drugs Administration) regulatory interests - food, drugs/medicines, medical devices biologics (vaccines, blood products), animal feed & drugs, cosmetics, radiation-emitting devices
  • the FDA moves towards a paperless environment, and the expected benefits in reduced process time and improved information exchange & controls
  • Security and Electronic Signature Standards, and security threats the FDA is concerned to cover
  • the FDA answer - 21 CFR Part 11, addressing general provisions, electronic records, and electronic signatures. Note the differentiation between electronic signatures and digital signatures. Mike reviewed the impacts of 21 CFR Part 11 in detail, with particular aspects being clarified during discussion.

Mike's personal conclusions were:

  • The FDA is suspicious of information submitted to it and therefore has high standards for data authenticity/integrity and submitter accountability
  • Software is not assumed to work and must be validated for use. This is a big issue - where to draw the line?
  • People don’t know what to audit. How far in the "system" do you go to achieve who did what when?Non compliant lab equipment is and will be a problem as paper output becomes obsolete
  • Other Federal agencies will follow the FDA’s lead and use 21 CFR 11 as a modelSystem validation, especially of integrated software from multiple vendors, remains a substantial challenge to manage effectively
  • What’s next: 
    • Compliance costing industry much more than anticipated
    • Movement to a "risk-based" approach
    • Change of leadership within the FDA – different perspectives?
    • A new release of the rules and regulations sometime in the future

Mike identified other biotech security concerns:

  • Key "ordinary issues" are hard for this community to solve - secure email, single signon (including integrating Kerberos with PKI).  The Open Group Security Forum can help here.
  • The Life Sciences community doesn’t know what needs to be secured - it is run by researchers, not IT practitioners
  • National Security, Bioterrorism, Scientific Openness - all issues affecting concerns over disclosure of scientific information. These can only be effectively addressed through policies.
  • "Endpoint security" – anonymous access of the genomic and other information and services
  • HIPAA Security Regulations – privacy regulated. Security "sufficient to ensure privacy"; security regulations could come in future (45 CFR Part 142, Security and Electronic Signature Standards; proposed rule put forward August 12 1998 - no finalization)

Mike perceives that this Life Sciences industry sector is looking for help to satisfy their IT security requirements for conformance to all these regulatory and professional conduct issues, and he is providing them with consultancy on it. he sees opportunity for us to produce a Manager's Guide on how to do information security basics for professionals in vertical market sectors - biotech, law, etc. Such a Guide would bridge the IT security understanding gap between our published Managers Guide to Information Security (MGIS) and their vertical sector's business needs. This industry sector is also interested in directories, electronic messaging/email, and architecture, so there are also potential opportunities for collaboration in these Open Group areas of Forum activity.

Secure Mobile Architecture (SMA) Requirements

The Mobile Management Forum (MMF) has created a SMA Requirements document, which has been made available to Security Forum members for their review and comment in preparation for the Burlingame meeting. This joint session with the Mobile Management Forum was intended to allow joint review of the security issues in their mobile architecture document.

For the report for this joint session held on Thursday 14.00-15.30, see the link to the MMF's meeting reports for that day.

Extensions to Identity Management Business Scenario

Ian Dobson reported that Martin Roe has joined the Security Forum and will contribute extensions to the existing published Identity Management Business scenario, as a Security Forum contribution to the joint Identity Management work program involving the Directory Interoperability Forum, the Mobile Management Forum, and the Messaging Forum. In recent Identity Management teleconferences, Ian and Martin have explained their objectives, and received confirmation from the participants, led by IDM Chairman Chris Apple, that these objectives align well with those of our joint Identity Management program.

In Martin's absence from this Burlingame meeting, Ian presented a summary of what this this activity will deliver and why it represents significant added value.

The extensions will decompose the wide range of different Identity Management related problems and issues identified in the existing business scenario, into discrete parts, focusing each part to be specific to end-users' business (functional) requirements that seem to need identity management capabilities, embodying a mix of pure online identity management, physical identification, and hybrid identification, to arrive at realistic requirements. In keeping with the pure business requirements approach that is the essence of business scenarios, these extensions will not presuppose that “Identity Management” itself is a business requirement, and will describe business operations that end users (individual or corporate) need or wish to achieve and why. Particular attention will be paid to:

  • the requirements of individuals who want to make available certain information about themselves, for use by other people
  • the requirements of a resource owner/holder who wants to provide a service to applicants but wants to make business judgements on each applicant so as to decide whether they are appropriate clients to do business with.

The draft revised business scenario will be developed in consultation and peer review with the Identity Management joint program members, over a period leading up to end April'03.

Managers Guide to Secure Email

Ian Dobson reported that progress on this proposed joint Managers Guide with the Messaging Forum has been delayed due to the lead author (Russ Chung, American Eagle) having other priorities. However, work on it, delayed since a teleconference on it in Nov'02 is now about to resume. Russ has advised Ian that he expects to produce a draft before the next meeting (Austin, Tx, USA, 30 April - 1 May 2003).

In brief discussion, it was noted that the Secure Messaging Challenge demonstrated successful exchange of "confidential" (strongly encrypted) email, and we must be clear that confidentiality is not all that a reader would normally expect from a Guide with the title "Secure". Ian will convey this expectation to Russ and the Messaging Forum Chair and Director.

Ian will liaise with Russ to monitor progress, and will keep the Security Forum members in formed.

White Paper on Access Control

Ian Dobson advised that when he undertook this work item prior to the Boston Conference in July 2002 he had expected to create an Access Control business scenario. However, the members' workshop in Boston had not produced sufficient input to enable him to develop a draft business scenario for review at the the Cannes Conference (Oct 2002). Despite some further input in the Cannes meeting, and a further teleconference (which was unsuccessful in producing further input), there remains insufficient input to create a business scenario.

Accordingly, he is generating a White Paper on Access Control. He expects to make this available for review by the end of Feb'03. It follows a similar structure to that for Open Group business scenarios, so hopes it will form a substantial basis for future development to become one.

Security Forum Roadmap & Future Work Plans

Ian Dobson presented a summary of the Security Forum's currently planned deliverables for 2003, and noted that visibility of these is maintained at our Web page http://www.opengroup.security/planning.htm.

The current planned deliverables are as follows:

  • Technical Guide to Security Design Patterns - by March 2003.
  • Business Guide to Data Privacy - by February 2003.
  • Business Guide to Identity/Authentication - Q103
  • Access Control White Paper - draft by February 2003
  • Evaluation of opportunity for Manager's Guide on how to do information security basics for professionals in vertical market sectors (biotech, law, etc)
  • Evaluation of opportunity for Business Guide on Secure Email, based on Secure Messaging Challenge - Q103
  • Extended Identity Management business scenario – Q203
  • Intrusion Attack & Response Workshop Scenario White Paper - Q103

Plans for Next Meeting (Austin)

The Security Forum discussed The Open Group's proposed shape for the members meeting in Austin, Texas, USA on 30 April - 1 May 2003, and in this light it proposes that its contributions to the public sessions will be:

  • Monday morning plenary: review of the strategy and current work plan for the Security Forum and its cross-functional projects with other Open Group Forums - 20 minute presentation.
  • Open session of 1.5 hours, comprising a presentation with time for Q&A on the Security Forum's new approach for Architecting Security for the Whole Enterprise, in the context of the Boundaryless Information Flow. This presentation will incorporate use of the TOGAF methodology, and the reference architecture and family of architectures concepts.

We expect to use the remaining time to run working sessions on all our ongoing projects, including the joint projects with the Real-Time Security Group on protection profiles, the Identity Management project, and the Messaging Forum's Guide to Secure Email.

Outputs

Security Requirements in the Life Sciences (Biotechnical) Industry:
Information update on Mike Jerbic's development of a working relationship and potential for working with the I3C.

Secure Mobile Architecture (SMA) Requirements
Information exchange achieved.

Extensions to Identity Management Business Scenario
Approval for ongoing work.

Managers Guide to Secure Email
Agreement to wait for the Messaging forum to produce a draft for this Guide. Noted that the Secure Messaging Challenge demonstrated successful exchange of "confidential" (strongly encrypted) email, and we must be clear that confidentiality is not all that a reader would normally expect from a Guide with the title "Secure".

White Paper on Access Control
Agreement to review the draft White Paper when it is available.

Review of Security Forum Roadmap & Future Work Plans
Confirmation of planned work projects and resources to produce intended deliverables from the Security Forum.

Next Steps

Security Requirements in the Life Sciences (Biotechnical) Industry
Mike will manage the liaison between The Open Group and the I3C, to identify and cultivate mutual business in the areas of IT security, directories, electronic messaging/email, architecture, and certification, and will call on the relevant Open Group Forum Directors and Sales to support him in developing these potential business opportunities.

Secure Mobile Architecture (SMA) Requirements
Monitor development of security solutions in the mobile space

Extensions to Identity Management Business Scenario
Martin Roe to proceed with developing these extensions as planned, with appropriate review by the Identity Management project members through regular teleconferences.

Managers Guide to Secure Email
Security Forum to monitor the ongoing work on this Guide being developed in the Messaging Forum. Ian Dobson will convey to Guide author (Russ Chung) the Security Forum observation that the Secure Messaging Challenge demonstrated successful exchange of "confidential" (strongly encrypted) email, and we must be clear that confidential email is not all that a reader would normally expect from a Guide with the title "Secure Email".

White Paper on Access Control
Ian Dobson to deliver draft document by end Feb'03

Review of Security Forum Roadmap & Future Work Plans
Ian Dobson to update the Security Forum Web page and progress work to produce the planned deliverables on time.

Links

Security Requirements in the Life Sciences (Biotechnical) Industry - presentation slides

Extensions to Identity Management Business Scenario - summary slides

Review of Security Forum Roadmap & Future Work Plans - visibility of these is maintained at http://www.opengroup.security/planning.htm


Home · Contacts · Legal · Copyright · Members · News
© The Open Group 1995-2012  Updated on Tuesday, 25 March 2003