The Jericho Forum’s Architecture for De-Perimeterised Security Presentation at CACS 2007 Auckland Prof. Clark Thomborson 10 th September 2007.

Slides:



Advertisements
Similar presentations
Learning Objects Network We see the e-knowledge market being the next major growth phase of the Internet Michael Moe, Merrill Lynch Tom Barefoot, Chief.
Advertisements

Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
Real world application  Protocols  Paul Simmonds ICI Plc. & Jericho Forum Board.
Collaboration Oriented Architecture COA Position Paper An Overview Adrian Seccombe Board of Management, Jericho Forum ® CISO & Snr Enterprise Information.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
IT Audit & Identity Management Challenges in a De-perimeterisation Scenario Henry S. Teng, CISSP, CISM Enterprise Security Compliance Officer Philips International.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Prepare for the future  The de-perimeterised “road-warrior”  Paul Simmonds ICI Plc. & Jericho Forum Board.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Real world application  Voice over IP  John Meakin Standard Chartered Bank & Jericho Forum Board.
Documenting Network Design
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SEC835 Database and Web application security Information Security Architecture.
The disappearing perimeter and The need for secure collaboration Bob West Founder and CEO, Echelon One, & Jericho Forum ® Board Member Jericho Forum at.
Jericho Forum Achievements  Steve Whitlock Board of Management, Jericho Forum ®
Lessons Learned in Smart Grid Cyber Security
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Surviving in a hostile world  The myth of fortress applications  Tomas Olovsson CTO, Appgate Professor at Goteborg University, Sweden.
Joseph Ferracin Director IT Security Solutions Managing Security.
Jericho une approche alternative de la sécurité Bjorn Gronquist (CSO Capgemini) Lyon – 26 novembre 2009 XIVe Symposium de l’Architecture du 16 au 26 novembre.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
IECM Briefing: XML Community of Practice Betsy Fanning AIIM.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Copyright © 2004 by The Web Services Interoperability Organization (WS-I). All Rights Reserved 1 Interoperability: Ensuring the Success of Web Services.
© Synergetics Portfolio Security Aspecten.
Data Integrity Lesson 12. Skills Matrix Maintaining Data Integrity Maintaining data integrity is your most important responsibility. –Performing backups.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Jericho’s Architecture for De-Perimeterised Security Presentation at ISACA/IIA Wellington Prof. Clark Thomborson 27 th July 2007.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Improving Integration of Learning and Management Systems Paul Shoesmith Director of Technical Strategy Becta.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Setting the Foundations  The Jericho Forum “Commandments”  Nick Bleech Rolls Royce & Jericho Forum Board.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Network security Product Group 2 McAfee Network Security Platform.
GREG CAPPS [ ASUG INSTALLATION MEMBER MEMBER SINCE:1998 ISRAEL OLIVKOVICH [ SAP EMPLOYEE MEMBER SINCE: 2004 GRETCHEN LINDQUIST [ ASUG INSTALLATION MEMBER.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Scalable Trust Community Framework STCF (01/07/2013)
Jericho Commandments, Future Trends, & Positioning.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Web Services Security Patterns Alex Mackman CM Group Ltd
Network Reliability and Interoperability Council VII NRIC Council Meeting Focus Group 1B Network Architectures for Emergency Communications in 2010 September.
COA Masterclass The introduction! Paul Simmonds Board of Management, Jericho Forum ® ex.CISO, ICI Plc.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Aalto Research Data Management Policy Ella Bingham 8 April 2016 This work is licensed under the Creative Commons Attribution 4.0 International License.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Progress Report on the U.S. NSTIC Efforts Jack Suess – Delegate for Research, Development, Education & Innovation
Driving Innovation Connect & Catalyse The Cultural – Creative Industries Contemporary & Future Challenges Sian Brereton 24 th February 2010.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
A Shift in the Data Security Paradigm
Stop Those Prying Eyes Getting to Your Data
The disappearing perimeter and The need for secure collaboration
iECM Briefing: XML Community of Practice
Collaboration Oriented Architecture COA Position Paper An Overview
Presentation transcript:

The Jericho Forum’s Architecture for De-Perimeterised Security Presentation at CACS 2007 Auckland Prof. Clark Thomborson 10 th September 2007

What is the Jericho Forum? The Jericho Forum is an international IT security thought-leadership group dedicated to defining ways to deliver effective IT security solutions that will match the increasing business demands for secure IT operations in our open, Internet-driven, globally networked world. Our members include multi-national corporate user organizations, major security vendors, solutions providers, and academics, working together to: drive and influence development of new architectures, inter- workable technology solutions, and implementation approaches, for securing our de-perimeterizing world support development of open standards that will underpin these technology solutions. See

Structural View User members are large corporations (e.g. Boeing) and governmental agencies (e.g. UK Foreign & Commonwealth Office), who own the Forum; vote on the deliverables; and run the Board of Managers. Vendor members (e.g. Symantec) have no votes; and participate fully in discussions. We now have 12 vendor members. We want more. Academic members (e.g. me) offer expertise in exchange for information of interest. (Note: academics trade in ideas, not $$ ;-)

Some Members of Jericho

Jericho’s De-perimeterised Security Observation: we drill holes through all our firewalls! A corporate perimeter defines a quality-of-service (QoS) boundary, not a security boundary. We are hardening our platforms, and our data objects, so that we can take advantage of the high connectivity and low cost of the internet. We can make trustworthy connections on an untrusted network, if we have a way to identify trustworthy communication partners. Our systems should use open standards, to allow interoperability, integration, and assurance.

Don’t we still need perimeters? Of course! Security is not defined without a perimeter. We put our valuables inside the perimeter. We (try to) keep the “bad guys” out. We (try to) allow the “good guys” in. The Jericho Forum is focussed on defining what we want: a “collaboration-oriented architecture”. We don’t care to argue about terminology, e.g. “de-perimeterisation” vs. “re-perimeterisation”.

Collaboration Oriented Architecture According to Wikipedia (since early July 07), “Collaboration Oriented Architecture is the ability to collaborate between systems that are based on the Jericho Forum principles or ‘Commandments’... “The term Collaboration Oriented Architecture was defined and developed in a meeting of the Jericho Forum at a meeting held at HSBC on the 6 th July 2007.”

The Jericho Commandments: Fundamentals (1-3)  The scope and level of protection must be specific and appropriate to the asset at risk.  Security mechanisms must be pervasive, simple, scalable, and easy to manage.  Assume context at your peril: security solutions designed for one environment may not be transferable. My analysis: The first two commandments are “motherhood and apple pie” – nobody will argue against them, but we can’t take them for granted! The third commandment reminds us that there will be more than one possible implementation of a system’s functional goals, depending on its security goals.

Surviving in a Hostile World  Devices and applications must communicate using open, secure protocols.  All devices must be capable of maintaining their security policy on an untrusted network. My analysis: Using HTTPS (or AS2) is a better idea, for interoperability, than using a proprietary communications protocol. Untrusted networks are cheap and omnipresent – let’s take advantage of this! Admission control on a trusted network is very expensive, except in situations where new or changed devices are very rarely supposed to be admitted.

The Need for Trust  All people, processes, technology must have declared and transparent levels of trust for any transaction to take place.  Mutual trust assurance levels must be determinable. My analysis: Static security requirements (for data) Confidentiality, Integrity, Availability Dynamic security requirements (for systems): Authentication, Authorisation, Audit (the gold standard); Identification, Trust assessment (for connections between systems, and between systems and users).

Identity, Management and Federation  Authentication, authorisation and accountability must interoperate out of your area of control. My analysis (in the context of content management): Digital Rights Management (DRM) is confidentiality control for licensed end-users Enterprise Content Management (ECM) is confidentiality and integrity control within an enterprise Perhaps... Inter-Enterprise Content Management (IECM) will provide confidentiality, integrity, and dynamic security control between enterprises. I believe technology (even with open standards) won’t suffice, we’ll also need audits and contracts.

Access to Data  Access to data should be controlled by security attributes of the data itself.  Data privacy (and security of any asset of sufficiently high value) requires a segregation of duties/privileges.  By default, data must be appropriately secured when stored, in transit and in use. My analysis (in the context of content management) IECM systems should have per-document metadata or licenses, and not rely on access-control lists. Our workflow systems must be integrated with our IECM systems; our workplace roles are more important than our individual identities when making security decisions. #11 is surprisingly hard to achieve on a contemporary laptop.

Jericho’s Position Papers We have published 13 position papers (at last count). A typical position paper is four pages long, with four sections: defining a key problem in a technology, such as VoIP, answering the question “why should I care... what are the consequences if I don't?” giving a recommendation or solution, and providing a background or rationale.

Jericho’s Position Paper on EIP&C Enterprise Information Protection & Control requirements: Key escrow and key management; User identity and the management of users outside your domain; End-point security must be assessed before access is allowed; Data should be classified, typically by the originator, including temporal conditions (destruction, release); Auditing of rights information; segregation of duties. “Current EIP&C solutions are proprietary, limiting their applications by enterprise domain, operating system family or to specific applications.”

Jericho’s Challenges for EIP&C We want a standard client interface/software, because it is undesirable and unlikely that any corporation can mandate that another company install and manage their preferred EIP&C solution. We want a standard set of agreed EIP&C classifications. We want an open, inherently secure protocol for consumers of EIP&C protected data to communicate with the server or enterprise which controls the data’s EIP&C attributes.

Our Vision To enable business confidence for collaboration and commerce beyond the constraint of the corporate, government, academic, and home office perimeter, principally through: Cross-organizational security processes and services Products that conform to open security standards and profiles (collections of logically related standards that make up a useful functional entity) Assurance processes that, when used in one organization, can be trusted by others. Do you think our vision is feasible? Desirable? Do you want to join the Jericho Forum?