Security Training Seminars An integral part of The Open Group Security Programme Dean Adams Director, Security & Electronic Commerce Agenda Check! j Brief Overview of Security Program Key Projects Introduction to Security Training Seminars 2 Scope of Program • • 3 For organisations implementing innovation in Security & Electronic Commerce, the security program aims to: – reduce business risks – reduce business costs – improve competitiveness Support for a secure infrastructure at 3 levels: – Internet – Enterprise-wide network (Intranet) – Platforms The IT DialTone Service ServiceQualities Qualities Management Services Transaction Processing Application Services Core Information Exchange Security Security Manageability Manageability Interoperability Interoperability International InternationalOperation Operation Scalability Scalability Portability Portability Location Services Security Services 4 Scope of Program Business BusinessRequirements Requirements identification, identification,definition definition&&prioritisation prioritisation Product ProductDevelopments Developments &&Industry IndustryTrends Trends Generating, Generating,Participating-in Participating-in&&Monitoring MonitoringTechnical TechnicalDevelopments Developments Standards, Collaborative Technology & Pilot Trials Standards, Collaborative Technology & Pilot Trials Defining DefiningBranding BrandingPrograms Programs supported by testing supported by testing Support Supportin inthe theMarketplace Marketplace Launch, communications, integration, Launch, communications, integration,training, training,procurement procurement 5 Scope of Program - evolution • Aim to provide a full service range to our partners – major system vendors, application & middleware providers, end-user organizations – mutually supportive activities, no “throw over the wall” attitude Standards Standards Development Development Partnerships Partnerships Testing Testing 6 Brand Brand Consultancy Consultancy Peer Peer Networking Networking Training Training Pilot Pilot Trials Trials Market Market Requirements Requirements Conformance & The Brand • Enforced by the X/Open Trade Mark Licence Agreement – It conforms to the Standard – It will continue to conform – Any problems, fixed by the supplier within set time Guaranteed by the supplier Brand can be taken away ! 7 Agenda Check! Brief Overview of Security Program j Key Projects Introduction to Security Training Seminars 8 Distributed Security Framework - (an application programmer’s view) Applications Users of Security Services Common Security Services Specific Mechanism Modules 9 System Services (e.g. network, file-system, database, etc.) Common Security Services (provided through Generic interfaces) Distributed Authentication Eg. Kerberos SESAME CryptoKnight Distributed Audit Cryptographic Services Key & Cert Management ETC. As Appropriate Common Architecture for PKI • • • • • 10 Defines, characterises, integrates, positions, components of a PKI Based on use of X509.v3 (due to overwhelming recommendation from customer community) but does not preclude use of other approaches (e.g. SDSI) Provides for, but does not mandate Key Recovery Drafts available publicly via web server References and integrates specifications from other sources – e.g. IETF, PC/SC, OpenCard Business decisions and Regulatory Framework establish trust relationships CA CA Allow for hierarchical structure, direct relationships, and web-of-trust relationships as deemed appropriate for individual circumstances. CA CA CA CA CA CA CA CA CA CA CA CA • Do not Dictate through technology CA CA CA CA CA CA CA CA 11 CA CA CA CA CA CA CA CA Business Decisions and Regulatory Framework establish separation/combination of Role CA CA CA CA CA CA ... RA RA RA RA RA RA RA RA RA RA RA RA RA RA RA RA RA RA RA RA RA RA RA RA Registration Authorities can be local to user (e.g. lawyers office, local chamber of commerce. Can offer services from multiple competing CA services (act as broker), customer choice based on business and regulatory considerations. 12 CDSA A search on the Internet reveals • • • Canadian Dam Safety Association Canadian Deaf Sports Association Comprehensive Digestive Stool Analysis But since this is a security presentation • Common Data Security Architecture 13 Common Data Security Architecture (CDSA) • • • • 14 For applications and services in a PKI environment – Coherent architecture – Comprehensive set of services Originally submitted by Intel – Revision and addition from PKI Task Group Intel, IBM, Netscape, Entrust, Trusted Information Systems prepared revised specifications – Fast-Track adoption Real commitment by suppliers to build into products CDSA Fast Track • • • • • 15 Formal review & comment period completed – final version being prepared for publication – formal approval Publish final standard - awaiting completion of legal procedures Test suites in development Brand (certification scheme) definition and supporting processes being developed development partnerships in the pipeline Common Data Security Architecture - CDSA Applications in C Applications in C++ Applications in Java Method Wrapper System Security Services Layered Services Middleware Tools Language Interface Adapter CSSM Security API Common Security Services Manager Security Add-in Modules Integrity Services Security Contexts CSP Manager TP Module Manager CL Module Manager DL Module Manager Elective Module Mgr SPI TPI CLI DLI EMI Cryptographic Service Provider Trust Model Library Data store 16 EM-API Certificate Library Data Storage Library New Category of Service Single Sign-On • • • 17 To support distributed heterogeneous enterprise-wide network Completed so far: – Pluggable Authentication Modules (PAM) • publicly available on web server In the pipe – Account Management built on LDAP based schema – Detailed proposals for brand, test Agenda Check! Brief Overview of Security Program Key Projects j Introduction to Security Training Seminars 18 Security Training Seminars • • • 19 New ! – Starts here in Amsterdam, establish as regular feature Integral part of Security Program – supporting standardization and collaborative technology initiatives in the field Aims: – practical advice of obvious value to the business – short to medium term tactical advice – medium to long term strategic advice – supported by case examples Security Training Seminars • Managing: – Dr. Phil Holmes • background in education, information management and publishing – Rob Tate • background in practical commercial consultancy • 20 Security Training Alliance – proposal for alliance of training partners – working under common marketing banner – common, shared set of training modules – co-operation between partners in satisfying customer organization’s training needs Security Survival An Indispensable Guide to Securing Your Business Security Survival An indispensable guide to securing your business Obtain from: – Prentice-Hall Regular & Internet http://www.prenhall.com – The Open Group Regular & Internet http://www.opengroup.org – Amazon Essential advice for users and managers Helps prepare you for net security Your guide to System Security Covers DCE Security 21 Internet only http://www.amazon.com Our Speakers Today • Stan Dormer, (Aid to Industry) – 30 years in IT and auditing – co-founder of COMPACS conferences now in 21st year • Pierre Noel (The Open Group) – practical expertise in DCE, security, Single Sign On open transaction processing, and distributed systems – principle Open Group consultant for Single Sign-On 22 Rules of Engagement • • • 23 Not a working group meeting – Panel Question & Answer Session Feel free to provide feedback to Phil Holmes and Rob Tate – either personally or via evaluation forms – content, quality, suggestions for future topics – interest in The Security Training Alliance Further opportunity for one on one discussion at the reception for interested parties