Jericho’s Architecture for De-Perimeterised Security Presentation at ISACA/IIA Wellington Prof. Clark Thomborson 27 th July 2007.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Real world application  Protocols  Paul Simmonds ICI Plc. & Jericho Forum Board.
A Successful RHIO Implementation
Collaboration Oriented Architecture COA Position Paper An Overview Adrian Seccombe Board of Management, Jericho Forum ® CISO & Snr Enterprise Information.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
IT Audit & Identity Management Challenges in a De-perimeterisation Scenario Henry S. Teng, CISSP, CISM Enterprise Security Compliance Officer Philips International.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
02/12/00 E-Business Architecture
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Applied Cryptography for Network Security
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Real world application  Voice over IP  John Meakin Standard Chartered Bank & Jericho Forum Board.
Virtual Private Network
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SEC835 Database and Web application security Information Security Architecture.
The disappearing perimeter and The need for secure collaboration Bob West Founder and CEO, Echelon One, & Jericho Forum ® Board Member Jericho Forum at.
Jericho Forum Achievements  Steve Whitlock Board of Management, Jericho Forum ®
Surviving in a hostile world  The myth of fortress applications  Tomas Olovsson CTO, Appgate Professor at Goteborg University, Sweden.
Jericho une approche alternative de la sécurité Bjorn Gronquist (CSO Capgemini) Lyon – 26 novembre 2009 XIVe Symposium de l’Architecture du 16 au 26 novembre.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Designing System for Internet Commerce 6. Functional Architecture Jinwon Lee.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
The Jericho Forum’s Architecture for De-Perimeterised Security Presentation at CACS 2007 Auckland Prof. Clark Thomborson 10 th September 2007.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Setting the Foundations  The Jericho Forum “Commandments”  Nick Bleech Rolls Royce & Jericho Forum Board.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Scalable Trust Community Framework STCF (01/07/2013)
Jericho Commandments, Future Trends, & Positioning.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Network Reliability and Interoperability Council VII NRIC Council Meeting Focus Group 1B Network Architectures for Emergency Communications in 2010 September.
COA Masterclass The introduction! Paul Simmonds Board of Management, Jericho Forum ® ex.CISO, ICI Plc.
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Progress Report on the U.S. NSTIC Efforts Jack Suess – Delegate for Research, Development, Education & Innovation
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
CS457 Introduction to Information Security Systems
Identity and Access Management
Data and database administration
Data and Applications Security Developments and Directions
The disappearing perimeter and The need for secure collaboration
Collaboration Oriented Architecture COA Position Paper An Overview
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Jericho’s Architecture for De-Perimeterised Security Presentation at ISACA/IIA Wellington Prof. Clark Thomborson 27 th July 2007

What is the Jericho Forum? The Jericho Forum is an international IT security thought-leadership group dedicated to defining ways to deliver effective IT security solutions that will match the increasing business demands for secure IT operations in our open, Internet-driven, globally networked world. Our members include multi-national corporate user organizations, major security vendors, solutions providers, and academics, working together to: drive and influence development of new architectures, inter- workable technology solutions, and implementation approaches, for securing our de-perimeterizing world support development of open standards that will underpin these technology solutions. See

Structural View User members are large corporations and some governmental agencies, who own the Forum; vote on the deliverables; and run the Board of Managers. Vendor members have no votes; and participate fully in discussions. We now have 12 vendor members. We want more. Academic members offer expertise in exchange for information of interest. (Note: academics trade in ideas, not $$ ;-)

Some Members of Jericho

Jericho’s De-perimeterised Security Observation: we drill holes through all our firewalls! A corporate perimeter defines a quality-of-service (QoS) boundary, not a security boundary. We are hardening our platforms, and our data objects, so that we can take advantage of the high connectivity and low cost of the internet. We can make trustworthy connections on an untrusted network, if we have a way to identify trustworthy communication partners. Our systems should use open standards, to allow interoperability, integration, and assurance.

Don’t we still need perimeters? Of course we do. Security can’t be defined without a perimeter. We put our valuables inside the perimeter. We try to keep the “bad guys” out. We allow the “good guys” in. So... de-perimeterisation could be renamed re- perimeterisation... Hmm... why not focus on the positive? We could define what we want, rather than try to describe the process of change... We want... a collaboration-oriented architecture!

Collaboration Oriented Architecture According to Wikipedia, Collaboration Oriented Architecture is the ability to collaborate between systems that are based on the Jericho Forum principles or “Commandments”. The term Collaboration Oriented Architecture was defined and developed in a meeting of the Jericho Forum at a meeting held at HSBC on the 6 th July 2007.

The Jericho Commandments: Fundamentals (1-3)  The scope and level of protection must be specific and appropriate to the asset at risk.  Security mechanisms must be pervasive, simple, scalable, and easy to manage.  Assume context at your peril: security solutions designed for one environment may not be transferable. My analysis, in the context of ECM: The first two commandments are appropriate design goals for any secure system, including my vapourware browser-based ECM. The third commandment reminds us that there will be more than one implementation of ECM, with differing levels of hardness. We’ll need help with our bridges between ECMs!

Surviving in a Hostile World  Devices and applications must communicate using open, secure protocols.  All devices must be capable of maintaining their security policy on an untrusted network. Application / analysis: Using HTTPS (or AS2) is a better idea, for interoperability, than using a proprietary ECM system without a standardised bridging protocol. Untrusted networks are cheap and omnipresent – let’s take advantage of this! Trusted networks are very expensive, and will prevent us from making type-2 and type-3 bridges.

The Need for Trust  All people, processes, technology must have declared and transparent levels of trust for any transaction to take place.  Mutual trust assurance levels must be determinable. These state “dynamic security” requirements for bridge creation. Decision support, for bridge-builders, will take the form of an interoperable reputation management system which gives us relevant information on individuals and organisations (and of their computers and certificates). We also want a trust management system to record our trusting decisions, and to help us re-evaluate our posture when new information arises. The certificate store in our web browser is a rudimentary trust management system. (Do you know how to use it?) These also state requirements on the use of an established bridge. For example, a company-confidential data object should not be transmitted over a bridge to an individual/organisation which is not trusted to respect confidentiality.

Identity, Management and Federation  Authentication, authorisation and accountability must interoperate out of your area of control. My vapourware ECM keeps track of “bridges” but doesn’t attempt to restrict their use. What document-level control can be exerted, at reasonable cost? Intracorporate workflow systems are affordable and appropriate, when large workforces (e.g. bureaucracies) handle repetitive data- processing tasks. These are type-1 bridges. Intercorporate workflow systems are very expensive and inflexible, implying that remote control (= strong DRM) across type-2 and type-3 bridges is infeasible. I think we must insist on periodic ECM-compliance audits of our bridging partners, if we want to detect and respond to possible violations of our remotely-enforced confidentiality policies.

Access to Data  Access to data should be controlled by security attributes of the data itself.  Data privacy (and security of any asset of sufficiently high value) requires a segregation of duties/privileges.  By default, data must be appropriately secured when stored, in transit and in use. Analysis / Application ECM systems should use document metadata to describe access rights, not separate licenses or access-control lists. Our computers don’t (yet) give us much assistance in managing our segregated data: this is a type-0 bridge, between two personae of the same individual! ECM systems should encrypt confidential documents, and they should digitally sign all documents (for authenticity); these crypto-operations should be done as close as possible to the point of use.

Jericho’s Position Papers We have published 13 position papers (at last count). A typical position paper is four pages long, with four sections: defining a key problem in a technology, such as VoIP, answering the question “why should I care... what are the consequences if I don't?” giving a recommendation or solution, and providing a background or rationale.

Jericho’s Position Paper on EIP&C Enterprise Information Protection & Control requirements: Key escrow and key management; User identity and the management of users outside your domain; End-point security must be assessed before access is allowed; Data should be classified, typically by the originator, including temporal conditions (destruction, release); Auditing of rights information; segregation of duties. “Current EIP&C solutions are proprietary, limiting their applications by enterprise domain, operating system family or to specific applications.”

Jericho’s Challenges for EIP&C We want a standard client interface/software, because it is undesirable and unlikely that any corporation can mandate that another company install and manage their preferred EIP&C solution. We want a standard set of agreed EIP&C classifications. We want an open, inherently secure protocol for consumers of EIP&C protected data to communicate with the server or enterprise which controls the data’s EIP&C attributes.

Our Vision To enable business confidence for collaboration and commerce beyond the constraint of the corporate, government, academic, and home office perimeter, principally through: Cross-organizational security processes and services Products that conform to open security standards and profiles (collections of logically related standards that make up a useful functional entity) Assurance processes that, when used in one organization, can be trusted by others. Do you think our vision is feasible? Desirable? Do you want to join the Jericho Forum?