Home · About · A-Z Index · Search · Contacts · Press · Register · Login
    


Objective of Meeting
Summary
Outputs
Next Steps
Links

Sponsoring Forum:

Security


Meeting Report

Security Forum Meeting
held on
Friday 7th February 2003

Objective of Meeting

Review proposal for new Security Forum project to develop Security Architectures for Boundaryless Information Flow.

Summary

In the Conference Plenary on Tuesday morning, Terry Blevins (CIO, The Open Group) and Eliot Solomon (Consultant, & SIMC Director) encouraged all Forums to work on Architectures for Boundaryless Information Flow - see the Plenary meeting report on their presentation.

The Security Forum held several discussions during its Wednesday and Thursday meetings, and these culminated in agreement in the final Security Forum meeting session on Friday AM to undertake a project on this.

The Security Forum is privileged to have Eliot Solomon among its members, so his understanding of the Boundaryless Information Flow approach to a reference architecture and to developing a family of architectures was of considerable benefit in helping other members of the Forum achieve an adequate understanding of this new architectural approach to security, and its benefits.

Eliot Solomon volunteered to lead this Security Architectures project. It was agreed that we will set up a Security Architectures Web page as a working area to make project documents available, and that we will progress this project through weekly teleconferences on Fridays at 09.00 US Pacific time. We will also use these weekly teleconferences to progress other Security Forum projects.

The approach proposes using TOGAF methodology, which will require some education in its use.

Much of the discussion in the Friday meeting addressed how we should get started on this project. It was agreed that a security taxonomy approach would help, and we are grateful to Steve Whitlock (Boeing Corporation) for presenting a security taxonomy as a starting point for moving forward. Steve offered to create a revised version to clarify specific items.

Those present confirmed our intent that this project should be the subject of our Security Forum open meeting contribution to the members meeting scheduled for Austin, Tx, USA on 20 April - 1 May, 2003.

Outputs

  • Agreement to start a new Security Architectures project.
  • Understanding of the Boundaryless Information Flow architectural approach.
  • Realization that we must learn how to use the TOGAF methodology.
  • Adoption of a security taxonomy as a starting point for the project.
  • Plan for weekly teleconferences at 09.00 each Friday to progress the Security Architectures project.

Next Steps

Action: Steve Whitlock to supply improved version of the adopted security taxonomy

Action: All need to familiarize themselves with the TOGAF methodology - see TOGAF 8 "Enterprise Edition" at http://www.opengroup.org/architecture/togaf8/index8.htm

Action: All to plan their regular involvement in the weekly project teleconferences (toll-free in USA) on Fridays at 09.00 US Pacific time.

Action: Ian Dobson to set up a Security Architectures Web page as the working area for project documents

Links

Document presenting a security taxonomy

TOGAF 8 "Enterprise Edition" at http://www.opengroup.org/architecture/togaf8/index8.htm


Home · Contacts · Legal · Copyright · Members · News
© The Open Group 1995-2012  Updated on Tuesday, 25 March 2003