This document presents security principles for cloud and service-oriented architecture (SOA) from The Open Group's Security for the Cloud & SOA Project. It provides general security principles that are widely applicable to securely designing enterprise architectures, as well as additional principles specifically relevant to securing cloud and SOA environments. The principles are intended to serve as a benchmark for assessing security concepts, designs, solutions, standards compliance, and system architectures.
Thought Leader Interview: Dr. William Turner on the Software-Defined Future ...Iver Band
As the Vice President, Datacenter Architecture at Presidio,
William Turner, PhD has more than 20 years of hand-son,
full-project-cycle experience in strategizing, designing and
deploying large-scale Fortune 500 networks and security
solutions. His extensive background in banking, security,
and government has yielded several well regarded industry
standards and noted reference models.
Dr. Turner envisions and drives a future in which sophisticated software provisions and de-provisions IT infrastructure automatically in response to business needs. The specialized appliances enterprises traditionally rely upon will be replaced by industry-standard hardware playing necessary roles on demand.
EAPJ conducted this interview from the perspective of an infrastructure architect considering a software-defined future for the networking, hosting and storage underlying a
major upcoming application investment.
In our day-to-day technical support for Calgary companies, one of the most common I.T. requests is the password reset. Click here to learn more about computer security and the different options for your business.
http://matterhornsolutions.ca/calgary-tech-support/
The document discusses how to audit outsourced IT environments. It provides guidance on:
- Key challenges when auditing outsourced IT, such as lack of transparency.
- Using the Cloud Security Alliance's (CSA) Cloud Controls Matrix (CCM) to include outsourced IT controls in audits. The CCM contains 98 controls mapped to standards.
- The CSA's Cloud Audit Initiative which provides questionnaires to help assess outsourced IT vendor controls and compliance.
The document discusses the OSI security architecture and common network security threats and defenses. It begins with an introduction to the OSI security architecture proposed by ITU-T as a standard for defining and providing security across network layers. It then discusses (1) specific security mechanisms like encryption and digital signatures and pervasive mechanisms like security audits; (2) common passive and active security threats like eavesdropping and denial of service attacks; and (3) that passive attacks focus on prevention while active attacks require detection and recovery. It concludes with exercises asking about these topics.
This white paper discusses how insurance companies can use the TOGAF and ArchiMate standards together with the ACORD framework and standards to manage their enterprise architectures and standardize their operations. It provides an overview of TOGAF, ArchiMate, and the ACORD initiatives. It then presents a case study of modeling the new business setup process for group term life insurance using these standards. The paper concludes that the ACORD framework and standards complement TOGAF and ArchiMate and can help insurance organizations achieve boundaryless information flow.
Modeling enterprise risk management and secutity with the archi mate languagechristophefeltus
The document discusses modeling enterprise risk management and security concepts using the ArchiMate modeling language. It summarizes relevant risk and security standards and frameworks that inform the concepts modeled, including risk, threats, vulnerabilities, controls, and risk domains. It then demonstrates how to model these concepts in ArchiMate in three ways: directly in ArchiMate, as specialized concepts, or as complementary concepts. Case studies show that ArchiMate can model most common risk and security concepts to help enterprises better manage risks.
Modeling Enterprise Risk Management and Security with the ArchiMate LanguageIver Band
The document provides an overview of how the ArchiMate modeling language can be used to model enterprise risk management and security concepts and relationships. It summarizes relevant risk and security standards and frameworks and extracts a set of core concepts. It then demonstrates how these concepts can be modeled using the ArchiMate language by mapping the concepts to ArchiMate elements and including examples from case studies. The document concludes that the ArchiMate language allows for modeling of the majority of common risk and security concepts and their relationships to other enterprise architecture concepts.
Thought Leader Interview: Dr. William Turner on the Software-Defined Future ...Iver Band
As the Vice President, Datacenter Architecture at Presidio,
William Turner, PhD has more than 20 years of hand-son,
full-project-cycle experience in strategizing, designing and
deploying large-scale Fortune 500 networks and security
solutions. His extensive background in banking, security,
and government has yielded several well regarded industry
standards and noted reference models.
Dr. Turner envisions and drives a future in which sophisticated software provisions and de-provisions IT infrastructure automatically in response to business needs. The specialized appliances enterprises traditionally rely upon will be replaced by industry-standard hardware playing necessary roles on demand.
EAPJ conducted this interview from the perspective of an infrastructure architect considering a software-defined future for the networking, hosting and storage underlying a
major upcoming application investment.
In our day-to-day technical support for Calgary companies, one of the most common I.T. requests is the password reset. Click here to learn more about computer security and the different options for your business.
http://matterhornsolutions.ca/calgary-tech-support/
The document discusses how to audit outsourced IT environments. It provides guidance on:
- Key challenges when auditing outsourced IT, such as lack of transparency.
- Using the Cloud Security Alliance's (CSA) Cloud Controls Matrix (CCM) to include outsourced IT controls in audits. The CCM contains 98 controls mapped to standards.
- The CSA's Cloud Audit Initiative which provides questionnaires to help assess outsourced IT vendor controls and compliance.
The document discusses the OSI security architecture and common network security threats and defenses. It begins with an introduction to the OSI security architecture proposed by ITU-T as a standard for defining and providing security across network layers. It then discusses (1) specific security mechanisms like encryption and digital signatures and pervasive mechanisms like security audits; (2) common passive and active security threats like eavesdropping and denial of service attacks; and (3) that passive attacks focus on prevention while active attacks require detection and recovery. It concludes with exercises asking about these topics.
This white paper discusses how insurance companies can use the TOGAF and ArchiMate standards together with the ACORD framework and standards to manage their enterprise architectures and standardize their operations. It provides an overview of TOGAF, ArchiMate, and the ACORD initiatives. It then presents a case study of modeling the new business setup process for group term life insurance using these standards. The paper concludes that the ACORD framework and standards complement TOGAF and ArchiMate and can help insurance organizations achieve boundaryless information flow.
Modeling enterprise risk management and secutity with the archi mate languagechristophefeltus
The document discusses modeling enterprise risk management and security concepts using the ArchiMate modeling language. It summarizes relevant risk and security standards and frameworks that inform the concepts modeled, including risk, threats, vulnerabilities, controls, and risk domains. It then demonstrates how to model these concepts in ArchiMate in three ways: directly in ArchiMate, as specialized concepts, or as complementary concepts. Case studies show that ArchiMate can model most common risk and security concepts to help enterprises better manage risks.
Modeling Enterprise Risk Management and Security with the ArchiMate LanguageIver Band
The document provides an overview of how the ArchiMate modeling language can be used to model enterprise risk management and security concepts and relationships. It summarizes relevant risk and security standards and frameworks and extracts a set of core concepts. It then demonstrates how these concepts can be modeled using the ArchiMate language by mapping the concepts to ArchiMate elements and including examples from case studies. The document concludes that the ArchiMate language allows for modeling of the majority of common risk and security concepts and their relationships to other enterprise architecture concepts.
Oracle Autonomous Analytics Cloud is a fully managed cloud service that provides analytics capabilities without requiring users to manage infrastructure. The steps to get started include signing up for a free trial or subscription, setting up services and user accounts as an administrator, and then exploring data visualization or enterprise data modeling as a user. Administrators can refer to documentation on setting up and managing services while users can find guidance on loading and analyzing data.
OpenChain Monthly Meeting North America - Europe - 2023-02-07Shane Coughlan
The OpenChain monthly meeting covered several topics:
1. An anti-trust policy notice reminding attendees to adhere to agendas and not participate in prohibited antitrust activities.
2. Specification news including recent adoption of security assurance specifications, a new third-party certifier, and updates to free online training courses.
3. Work on standards and core materials including proposed changes to open source definitions and discussions of issues raised on GitHub regarding adding new definitions, requirements, and references to ISO standards within the Security Assurance Specification.
This document provides a checklist of secure coding practices for software developers. It covers topics such as input validation, output encoding, authentication, session management, access control, cryptography, error handling, data protection, and general coding practices. Implementing the practices in this checklist can help mitigate common software vulnerabilities and security issues. The document recommends defining security roles and responsibilities, providing training, and following a secure software development lifecycle model.
This Case Study demonstrates the value of the ArchiMate® 2.1 modeling language for planning and expressing complex business transformation. The Case Study is about a fictitious manufacturer named ArchiMetal. Through high-level architecture modeling, the ArchiMate language illuminates the coherence between an organization, and its processes, applications, and infrastructure. This Case Study presents examples of ArchiMate models that can be elaborated as necessary for analysis, communication, decision support, and implementation.
This document provides an overview of Oracle Application Express (APEX) and instructions for setting up an APEX development environment. It covers accessing a hosted demo environment, setting up a local instance, creating workspaces and user accounts. It also includes steps for installing sample objects and getting started with the Application Builder tool to create an application with reports and forms.
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)Shane Coughlan
The document summarizes the agenda and discussions from an OpenChain monthly meeting on February 21, 2023. Key discussion points included:
- Reminders about anti-trust policies for the meeting.
- Updates on adoption of OpenChain specifications, security assurance certification programs, and free online training courses.
- Discussion of definitions in the specifications to harmonize licensing and security definitions.
- Proposed changes to the security assurance specification in response to issues raised on GitHub, including adding definitions for "remediate" and "mitigate", adding requirements under the "Competence" category, and including references to relevant ISO standards.
This document provides an overview and instructions for using Oracle Application Express (APEX) websheets and database applications. It covers topics such as running websheets, adding and editing page sections and data grids, and managing websheet pages. The primary audience is end users of APEX. It includes information on features like breadcrumbs, navigation sections, online help, search, and the control panel.
OpenChain Germany Work Group Meeting 2022-11-16Shane Coughlan
The document summarizes the agenda for an OpenChain Germany Work Group meeting on 2022-11-16. It includes sections on anti-trust policy, introductions, specification news including an upcoming chair rotation, SBOM news from SPDX, OSPO news from TODO, security news from OpenSSF, automation news including the Capability Map and OpenAPI spec, and plans to work on OpenChain standards and reference materials. Attendees are reminded to adhere to anti-trust guidelines and the meeting will involve updates and planning work related to various OpenChain subprojects and standards.
OWASP Secure Coding Practices - Quick Reference GuideLudovic Petit
This document provides a quick reference guide for secure coding practices. It contains a checklist of over 50 secure coding practices organized into categories such as input validation, authentication, session management, and access control. The introduction provides an overview of why secure coding is important and recommends establishing secure development processes and training developers. It defines key security concepts like threats, vulnerabilities, and risks. The goal is to help development teams integrate security practices into the software development lifecycle to mitigate common vulnerabilities.
In this presentation, Dmitry Khlebnikov sets forward six broad principles for designing secure IT systems. He also provides a comprehensive overview of "Host-based Security"
Host-based Security, by Dmitry Khlebnikov @ Secure Development MelbourneAlec Sloman
In this presentation, Dmitry Khlebnikov sets forward 6 broad principles for designing secure IT infrastructure, and provides a comprehensive overview of "Host-based Security".
Oracle database 12c 2 day + application express developer's guidebupbechanhgmail
Oracle Application Express is a rapid web application development tool that uses a browser-based interface to access PL/SQL code and data stored in Oracle database tables, eliminating the need for separate application servers. Developers work within private database schemas called workspaces to build and test applications, while end users access deployed applications through only a web browser. The embedded PL/SQL gateway or Oracle HTTP Server with mod_plsql act as the communication broker between the web server and Oracle Application Express objects in the database.
SAMPLE HIPAA Security Rule Corrective Action Plan Project CharterDavid Sweigert
This document outlines plans for a HIPAA Remediation Project to strengthen an organization's IT security governance by implementing the ISO 27001/2 framework. The project aims to develop policies, processes, and controls to safely manage sensitive information and address security risks and audit findings. Key objectives include protecting information, managing risks, developing guidance policies, and demonstrating compliance to auditors. The roles of the Privacy and Security Officer, Chief Information Security Officer, General Counsel, and Director of Human Resources are defined to support implementing the new governance framework.
Data Center Security: Achieving Prevention & the Targeted Prevention Policy's...Symantec
This whitepaper discusses a suggested process to achieve the deployment of host-based intrusion prevention (HIPS) policies in any organization and how the Symantec Data Center Security: Server Advanced Targeted Prevention policy can play a major role in helping the organization gain confidence in Symantec’s intrusion prevention technology.
The document provides an overview of managing supplier information in Oracle Fusion Applications including:
- Supplier profiles contain key entities like addresses, contacts, tax registrations and bank accounts.
- Supplier user provisioning allows qualified suppliers to self-manage user accounts for portal access.
- Job roles define the tasks users can perform and are assigned during provisioning workflows.
- An administrator manages the list of assignable supplier roles while procurement sets role usage options.
Sample Cloud Application Security and Operations Policy [release]LinkedIn
This document provides a sample cloud applications security and operations policy to guide organizations in developing security policies for cloud applications. It includes sections on authentication and administration, auditing, business continuity, data security, communication security, vendor governance, and brand reputation. For each section, it outlines baseline requirements and additional requirements for applications handling data at different security levels (1-3), based on the potential impact of unauthorized access. The goal is to balance security and usability by applying more stringent requirements to higher risk or sensitive data.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Oracle Autonomous Analytics Cloud is a fully managed cloud service that provides analytics capabilities without requiring users to manage infrastructure. The steps to get started include signing up for a free trial or subscription, setting up services and user accounts as an administrator, and then exploring data visualization or enterprise data modeling as a user. Administrators can refer to documentation on setting up and managing services while users can find guidance on loading and analyzing data.
OpenChain Monthly Meeting North America - Europe - 2023-02-07Shane Coughlan
The OpenChain monthly meeting covered several topics:
1. An anti-trust policy notice reminding attendees to adhere to agendas and not participate in prohibited antitrust activities.
2. Specification news including recent adoption of security assurance specifications, a new third-party certifier, and updates to free online training courses.
3. Work on standards and core materials including proposed changes to open source definitions and discussions of issues raised on GitHub regarding adding new definitions, requirements, and references to ISO standards within the Security Assurance Specification.
This document provides a checklist of secure coding practices for software developers. It covers topics such as input validation, output encoding, authentication, session management, access control, cryptography, error handling, data protection, and general coding practices. Implementing the practices in this checklist can help mitigate common software vulnerabilities and security issues. The document recommends defining security roles and responsibilities, providing training, and following a secure software development lifecycle model.
This Case Study demonstrates the value of the ArchiMate® 2.1 modeling language for planning and expressing complex business transformation. The Case Study is about a fictitious manufacturer named ArchiMetal. Through high-level architecture modeling, the ArchiMate language illuminates the coherence between an organization, and its processes, applications, and infrastructure. This Case Study presents examples of ArchiMate models that can be elaborated as necessary for analysis, communication, decision support, and implementation.
This document provides an overview of Oracle Application Express (APEX) and instructions for setting up an APEX development environment. It covers accessing a hosted demo environment, setting up a local instance, creating workspaces and user accounts. It also includes steps for installing sample objects and getting started with the Application Builder tool to create an application with reports and forms.
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)Shane Coughlan
The document summarizes the agenda and discussions from an OpenChain monthly meeting on February 21, 2023. Key discussion points included:
- Reminders about anti-trust policies for the meeting.
- Updates on adoption of OpenChain specifications, security assurance certification programs, and free online training courses.
- Discussion of definitions in the specifications to harmonize licensing and security definitions.
- Proposed changes to the security assurance specification in response to issues raised on GitHub, including adding definitions for "remediate" and "mitigate", adding requirements under the "Competence" category, and including references to relevant ISO standards.
This document provides an overview and instructions for using Oracle Application Express (APEX) websheets and database applications. It covers topics such as running websheets, adding and editing page sections and data grids, and managing websheet pages. The primary audience is end users of APEX. It includes information on features like breadcrumbs, navigation sections, online help, search, and the control panel.
OpenChain Germany Work Group Meeting 2022-11-16Shane Coughlan
The document summarizes the agenda for an OpenChain Germany Work Group meeting on 2022-11-16. It includes sections on anti-trust policy, introductions, specification news including an upcoming chair rotation, SBOM news from SPDX, OSPO news from TODO, security news from OpenSSF, automation news including the Capability Map and OpenAPI spec, and plans to work on OpenChain standards and reference materials. Attendees are reminded to adhere to anti-trust guidelines and the meeting will involve updates and planning work related to various OpenChain subprojects and standards.
OWASP Secure Coding Practices - Quick Reference GuideLudovic Petit
This document provides a quick reference guide for secure coding practices. It contains a checklist of over 50 secure coding practices organized into categories such as input validation, authentication, session management, and access control. The introduction provides an overview of why secure coding is important and recommends establishing secure development processes and training developers. It defines key security concepts like threats, vulnerabilities, and risks. The goal is to help development teams integrate security practices into the software development lifecycle to mitigate common vulnerabilities.
In this presentation, Dmitry Khlebnikov sets forward six broad principles for designing secure IT systems. He also provides a comprehensive overview of "Host-based Security"
Host-based Security, by Dmitry Khlebnikov @ Secure Development MelbourneAlec Sloman
In this presentation, Dmitry Khlebnikov sets forward 6 broad principles for designing secure IT infrastructure, and provides a comprehensive overview of "Host-based Security".
Oracle database 12c 2 day + application express developer's guidebupbechanhgmail
Oracle Application Express is a rapid web application development tool that uses a browser-based interface to access PL/SQL code and data stored in Oracle database tables, eliminating the need for separate application servers. Developers work within private database schemas called workspaces to build and test applications, while end users access deployed applications through only a web browser. The embedded PL/SQL gateway or Oracle HTTP Server with mod_plsql act as the communication broker between the web server and Oracle Application Express objects in the database.
SAMPLE HIPAA Security Rule Corrective Action Plan Project CharterDavid Sweigert
This document outlines plans for a HIPAA Remediation Project to strengthen an organization's IT security governance by implementing the ISO 27001/2 framework. The project aims to develop policies, processes, and controls to safely manage sensitive information and address security risks and audit findings. Key objectives include protecting information, managing risks, developing guidance policies, and demonstrating compliance to auditors. The roles of the Privacy and Security Officer, Chief Information Security Officer, General Counsel, and Director of Human Resources are defined to support implementing the new governance framework.
Data Center Security: Achieving Prevention & the Targeted Prevention Policy's...Symantec
This whitepaper discusses a suggested process to achieve the deployment of host-based intrusion prevention (HIPS) policies in any organization and how the Symantec Data Center Security: Server Advanced Targeted Prevention policy can play a major role in helping the organization gain confidence in Symantec’s intrusion prevention technology.
The document provides an overview of managing supplier information in Oracle Fusion Applications including:
- Supplier profiles contain key entities like addresses, contacts, tax registrations and bank accounts.
- Supplier user provisioning allows qualified suppliers to self-manage user accounts for portal access.
- Job roles define the tasks users can perform and are assigned during provisioning workflows.
- An administrator manages the list of assignable supplier roles while procurement sets role usage options.
Sample Cloud Application Security and Operations Policy [release]LinkedIn
This document provides a sample cloud applications security and operations policy to guide organizations in developing security policies for cloud applications. It includes sections on authentication and administration, auditing, business continuity, data security, communication security, vendor governance, and brand reputation. For each section, it outlines baseline requirements and additional requirements for applications handling data at different security levels (1-3), based on the potential impact of unauthorized access. The goal is to balance security and usability by applying more stringent requirements to higher risk or sensitive data.
Similar to Open security architecture - Overview (20)
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
1. Security Principles for
Cloud and SOA
A White Paper by:
The Security for the Cloud & SOA Project of
The Open Group Cloud Computing Work Group
December 2011
3. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 3
Table of Contents
Executive Summary 4
Nature of Security Principles 5
Setting the Principles in Context 6
Drivers for Security 7
Risk.....................................................................................................................7
CIA.....................................................................................................................7
Format of Principles 8
General Security Principles 9
Fundamentals......................................................................................................9
Trust .................................................................................................................11
Data Protection.................................................................................................12
Management.....................................................................................................13
Interoperability .................................................................................................15
Cloud and SOA Security Principles 16
Other Sources 19
ISO/IEC 27001.................................................................................................19
NIST.................................................................................................................19
Joint ISF, (ISC)2, and ISACA..........................................................................19
OECD...............................................................................................................20
The Jericho Forum®
..........................................................................................20
About the Authors 21
Lead Author......................................................................................................21
Base Document.................................................................................................21
Lead Reviewers ................................................................................................21
Other Reviewers...............................................................................................21
About The Open Group 21
4. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 4
Executive Summary
This White Paper is part of a series on Security in Cloud and SOA computing, which provides guidelines for
Enterprise Architects involved in developing risk-based approaches to securing Cloud and SOA computing.
In outline, our approach is to gather requirements and from them build architectures to meet those
requirements, adhering to principles where relevant, and documenting architectural decisions as appropriate.
It is strongly based on key work deliverables from the Security for the Cloud & SOA Project in The Open
Group – which is a joint project between the Cloud Computing and SOA Work Groups and the Security
Forum, and aligns with the Jericho Forum Commandments.
This White Paper presents a set of Security Principles. The Security for the Cloud & SOA Project is
publishing them as a White Paper to ensure that they achieve the public prominence and visibility that they
merit as essential guidelines on the general requirements necessary to assure effective information security.
People use “principles” as a test to check whether their decisions are sound and address all the aspects
involved. In designs, we use principles as a validation tool to check we are doing things right and have not
forgotten anything that is material to achieving the design goals. They are especially valuable when there are
many aspects/views to a complex design, because they remind us of issues which we find hard to bring to
mind when we're deeply involved in such design complexity.
Many of these security principles are general to the secure design of all enterprise architectures, so they are
widely applicable as guidance to architecting secure systems in all environments. We have also identified
principles that we see as having specific relevance to securing Cloud and SOA environments, so we list these
as additions to the General Security Principles.
Boundaryless Information Flow™
achieved through global interoperability
in a secure, reliable, and timely manner
5. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 5
Nature of Security Principles
Security Principles define key design features of information security that should be applied when
architecting a secure architecture (or framework, or infrastructure). These features must:
• Be defined in plain language
• Use terms that have clear meaning within the context being used
• Be technology-neutral; i.e., independent of any technologies or design implementation
They serve as a benchmark against which security concepts, designs, solutions, compliance with standards
and applicable regulations, and system architectures, can be methodically assessed and measured. An
example of how this may be done is the Jericho Forum’s Self-Assessment Scheme.1
1
Jericho Forum Self-Assessment Scheme; available at: www.opengroup.org/jericho/SAS_Guide.pdf.
6. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 6
Setting the Principles in Context
As will be clear from reviewing these Security Principles, they are by no means all exclusively relevant to
SOA and Cloud architectures, but they may well represent specific challenges in those environments. They
are also just a part of the complete body of work being developed by the Security for the Cloud & SOA
Project.
This project has also defined a set of Architecture Building Blocks (ABB) applicable to SOA and Cloud (but
potentially also to other situations). In our growing series of White Papers explaining our scenario-based
approach:
• An Architectural View of Security for Cloud2
– examining policy-based security through scenarios,
using Identity Entitlement and Access Management (IEAM) as an example of policy-driven security
concerns, to illustrate an approach that can be applied to other aspects of Security in the Cloud
• Forthcoming Data & Information Protection White Paper
• Forthcoming Cloud Security Architecture White Paper
• Forthcoming Architectural Decisions White Paper
and more, we illustrate possible deployment models for these building blocks across various consumers and
providers and show how the principles can be used to help to assess the value and risk of each model in the
practical situations experienced by both consumers and providers.
The complexities, particularly in Cloud, of dealing with an ecosystem of other providers and consumers, may
at times mean that we cannot easily comply with our own principles. The project has formalized a template
for documenting and making architectural decisions in these situations as well as producing a sample
illustrative set of decisions.
The completed body of work is intended to help architects develop secure and adaptable solutions for their
own organizations’ concrete situation and business goals.
2
An Architectural View of Security for Cloud, White Paper (W116), May 2011, published by The Open Group; available at:
www.opengroup.org/bookstore/catalog/w116.htm.
7. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 7
Drivers for Security
Risk
Risk of loss is the business driver for security. Enterprises need to perform risk assessments to understand
their exposure to risk of loss. This is often referred to as their risk profile. Business managers then use the
results from risk assessments to make informed business decisions on how to manage their risks of loss –
either by accepting each risk, or by mitigating it – through investing in appropriate security protective
measures judged sufficient to lower the potential loss to an acceptable level, or by investing in external
indemnity.
Critical to enabling good business decision-making therefore is to use risk assessment methods which give
objective, meaningful, consistent results.3
CIA
Confidentiality, Integrity, and Availability (CIA) are commonly accepted as capturing the prime objectives
for what security measures aim to achieve. The security architect should always keep these three key aspects
of information security at the forefront of any solution where data is involved:
• Confidentiality: Data is shared only to authorized actors (the right people).
• Integrity: Data can be assured to be authentic, trustworthy, and complete.
• Availability: The solution ensures access for delivering, storing, and processing data when required.
A key aspect of information and solution security, especially in regard to data, is to preserve these three
fundamentals. Failure to deliver a solution which addresses these objectives can result in losses which may
even threaten corporate survival. A secure solution requires information access to be appropriately
controlled; data to be complete and trusted; and data to be available when required. A documented
understanding of the requirements for all three must lie at the forefront of a solution architecture. Care must
be taken that the solution meets those demands, but does not become over elaborate; nor favors one over the
others.
3
Risk Taxonomy, Technical Standard (C081), January 2009, published by The Open Group; available at:
www.opengroup.org/bookstore/catalog/c081.htm
8. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 8
Format of Principles
It is useful to have a standard way of defining Principles. In addition to a definition statement, each Principle
should have associated rationale and implications statements, both to promote understanding and acceptance
of the Principles themselves, and to support the use of the Principles in explaining and justifying why specific
decisions are made.
This White Paper follows the format used in TOGAF 9 Chapter 23:
Name Should both represent the essence of the rule as well as be easy to remember. Specific
technology platforms should not be mentioned in the name or statement of a principle.
Statement Should succinctly and unambiguously communicate the fundamental rule. For the most
part, the principles statements for managing information are similar from one
organization to the next. It is vital that the principles statement be unambiguous.
Rationale Should highlight the business benefits of adhering to the principle, using business
terminology. Point to the similarity of information and technology principles to the
principles governing business operations. Also describe the relationship to other
principles, and the intentions regarding a balanced interpretation. Describe situations
where one principle would be given precedence or carry more weight than another for
making a decision.
Implications Should highlight the requirements, both for the business and IT, for carrying out the
principle – in terms of resources, costs, and activities/tasks. It will often be apparent that
current systems, standards, or practices would be incongruent with the principle upon
adoption. The impact to the business and consequences of adopting a principle should
be clearly stated. The reader should readily discern the answer to: “How does this affect
me?” It is important not to oversimplify, trivialize, or judge the merit of the impact. Some
of the implications will be identified as potential impacts only, and may be speculative
rather than fully analyzed.
9. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 9
General Security Principles
The following Security Principles are common to all designs aiming to assure a secure IT architecture.
For ease of navigation, these General Security Principles are grouped under the following headings. Their
order of appearance does not imply priority of importance.
• Fundamentals
• Trust
• Data Protection
• Management
• Interoperability
Fundamentals
Name Policy-driven
Statement Security must be driven by security policy.
Rationale Business managers use the results from risk assessments to make informed business
decisions on how to manage their enterprise’s risks of loss – either by accepting each
risk, or by mitigating it through investing in appropriate security measures judged
sufficient to lower the potential loss to an acceptable level, or by investing in external
indemnity.
Security policy should be maintained on untrusted networks; e.g., the Internet.
Implications A security policy defines the rules for protection of the enterprise’s IT systems. Security
architects must work from the security policy of the enterprise to design security
measures that are necessary and sufficient for that enterprise.
Name People, Process, and Technology
Statement All people, processes, and technology must have declared and transparent levels of
trust for any transaction to take place.
Rationale Trust in this context is establishing understanding between contracting parties to
conduct a transaction, and the obligations this assigns on each party involved.
Trust models must encompass people/organizations and devices/infrastructure.
Implications Trust level may vary by location, transaction type, user role, and transactional risk.
Name Open-ness
Statement Information security solutions should depend on open systems mechanisms.
Rationale Open-ness is of primary importance in an enterprise environment. This includes support
for all major platforms, run-times, languages, support for major industry standards,
published interfaces and algorithms, no security by obscurity, documented trust and
threat models, and support for Common Criteria and similar formal security validation
programs.
Implications Components which are not available through open systems mechanisms or fair-use
license should be deprecated.
10. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 10
Name Security by Design
Statement Security should be designed-in as an integrated part of the system architecture.
Rationale Security should not be an afterthought in IT solutions, but should be incorporated as
part of those solutions. Coherent security mechanisms must span all tiers of the
architecture, and be scalable – from small objects to large objects. This is helped by a
consistent definition and management of configurations, a consistent set of security
roles and persona across products, and a consistent security management user
interface.
Implications Ensuring continued compliance and regulatory alignment should be seen as a
requirement and must be considered when completing any security solution.
To be both coherent and scalable, interoperable security “building blocks” need to be
capable of being combined to provide the required security mechanisms.
Name Sharing
Statement Security solutions should include management mechanisms to accommodate sharing.
Rationale Multiple solutions can share a single IT environment, such as in a shared service
center. To achieve this goal, security services and management must be able to span
multiple domains, each domain potentially providing its own and independently set
security policy, identity, models, and so on. Architectures must explicitly document the
assumptions and limitations made in terms of span of control.
Implications Interoperability is key to sharing, and is enabled by using open systems standards
wherever possible.
Name Defense in Depth
Statement Multiple levels of protection, especially if they use different mechanisms, should be
used to provide effective defense in depth.
Rationale Defense in depth can be achieved by multiple levels of enforcement and detection.
Resources must be designed to protect themselves as a first layer of defense.
Intrusions can be contained through isolation and zoning. Multiple levels also minimize
the attack surface to the outer-most accessible layer.
Designs should incorporate fail-safe techniques.
Different (but complementary) protection mechanisms should be used whenever
available. A single type of security solution or application should not be solely relied
upon as a protection mechanism. If one is compromised, similar mechanisms may be
compromised in the same manner.
In the same context, while two independent layers of protection for one resource may
improve security, using two different mechanisms for the same purpose for two
resources increases the chances that if one of them gets broken the other can remain
unbroken.
Implications Multiple layers of protection clearly affords increased protection, especially if each layer
uses a different defense mechanism. These mechanisms, however, must be carefully
deployed to avoid reduced operational efficiency in enabling authenticated users to gain
timely access to resources to which they are entitled and authorized.
In all cases, the closer the protection is to the resource, the more effective is that
protection. Integrating protection with the resource so that it is self-protecting adds even
greater protection.
11. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 11
Name Security is Model-driven
Statement Models are reflective of the operating environment, common models, and consistent
formats for identity and trust, data, policy, applications, security information and events,
and cryptographic keys.
Rationale Models are consistently interpreted across the stack (for example, network identities are
linked to application-level identities) and across units (for example, policies and trust are
negotiated and understood within a federation). Models are consistently validated
against reality (feedback from policy and model discovery).
Implications Using models is a valuable tool to check for consistency and discover any gaps or flaws
in a design.
Name Simplicity
Statement Security mechanisms should be pervasive, simple, scalable, and easy to manage.
Rationale Designs for security solutions should be as simple as is needed to make them effective,
and be coherent across the whole architecture. Unnecessary complexity is a threat to
good security; a complex security system solution increases the likelihood of unknown
and unforeseen weaknesses in its security, and makes it more difficult to understand. A
solution cannot be protected sufficiently if it is not sufficiently understood and easy to
manage. This simplicity principle overlaps with the Security by Design principle.
Implications Secure architectures are most effective when based on a thorough understanding of the
requirements, leading to a design that provides effective adequate protection while
minimizing complexity and impact on operational performance.
Name Protection Against Insider & Outsider Attacks
Statement Security measures should maintain their intended effectiveness irrespective of the
source credentials of a principal claiming access to a resource.
Rationale Security solutions should cater to mitigate both internal and external threats, because
insider attacks account for the majority of all attacks. Security defence should be
implemented in a manner that is not differentiated based on the threat source. Also,
critical information assets may require additional levels of authentication and
authorization regardless of where they are accessed.
Implications Protection of resources – including digital identities and personas, as well as assets –
should be applied strictly, irrespective of whether the claim for access originates from
inside or outside the corporate perimeter.
Trust
Name Trust Assurance
Statement Mutual trust assurance levels must be determinable.
Rationale Devices and users must be capable of appropriate levels of (mutual) authentication for
accessing systems and data.
Authentication and authorization frameworks must support the trust model.
Implications Trust assurance must be interoperable to support business collaborations.
12. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 12
Name Weakest Link
Statement Overall security can only be as effective as the weakest link in the chain from end-to-
end.
Rationale Designs need to identify and eliminate or monitor any possible vulnerability within the
security solution – which may be people or process – i.e., not necessarily technology-
related. Security is only as strong as the weakest link, so intelligent attackers will seek
the weakest point to attack.
Designs should minimize the number of possible entry points that attackers can find,
and provide specific monitoring and control mechanisms at these points. This principle
has particular application to SOA, where a potentially large number of services
collaborate in different business processes and contexts. It encourages use of a
mediation layer to control access to services, as opposed to each individual application
managing its own authentication and authorization, therefore minimizing the number of
potential weakest links.
All parties involved in the implementation of a secure chain must accept responsibility
for the complete chain of security end-to-end. If one party in the chain does not conform
or otherwise compromises a security component, they will introduce a weakness in the
overall implementation.
See also the Separation of Duties principle.
Implications While this principle is readily appreciated when envisioning the strength of a chain, it
does require solution architects and designers to analyze the complete path of a system
flow from one end to the other end, and assess the security of that path at each point
where the continuity changes from one medium to another. Experience indicates that
the endpoints are a particular point where security can be weak.
Data Protection
Name Security Context
Statement Validate the security context for which the security solution(s) is designed.
Rationale Security-critical resources must be aware of their security context. Assume security
context at your peril, because security solutions designed for one environment may not
be transferable to work effectively in another. Thus, it is important to understand the
limitations of any security solution.
Use-Cases:
1. Problems, limitations, and issues can come from a variety of sources, including
geographic, legal, technical, acceptability of risk, etc.
2. Resources and actors should be kept aware of their environment (including physical
location and logical co-location), and their security status and context.
Implications Architects and designers need to analyze the complete domain they are designing in, to
validate that they are not making invalid assumptions when proposing to use a security
resource that is familar in one domain into another domain – where perhaps one, but
importantly at least one, critical criterion is different.
Name Data Access Control
Statement Access to data should be controlled by security attributes of the data itself.
Rationale Attributes which facilitate access can be held within the data (Digital Rights
Management/metadata) or they could be held on or consist of a separate system.
Access/security could be complemented by encryption. Access/security controls can be
enhanced through encryption. Some data may have, or require, classifications for wider
audiences such as “public, non-confidential” attributes. Access and access rights may
have, or require, a temporal component.
13. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 13
Name Data Access Control
Implications Design for access to data – in fact any system asset – should include consideration of
what attributes the asset owner has provided to protect access to that asset.
Name Data Protection
Statement By default, data must be appropriately secured when stored, in transit, and in use.
Rationale Must maintain security policy for protection of data at all stages.
Removing a default must be a conscious act.
High security should not be enforced for everything.
“Appropriate” in the statement of this principle means varying the level of restricted
access according to the sensitivity of the data. For example, the G8 “traffic light”
protocol for data sensitivity classification defines red for highly sensitive, amber for
sensitive, green for normal business, and white for public.
Implications Information should be classified at levels of restricted access which define how much
security they need – from none (for public data) to highly sensitive.
Management
Name Accountability
Statement Security solutions should include collection of audit information on system operations.
(See also the Accountability in Service-based Architectures principle.)
Rationale In today’s environments, with many requirements in the compliance area, it is important
that all security-relevant actions can be logged and audited, the audit infrastructure
should be scalable to handle these events, and audit information must be immutable
and not easily repudiated.
Implications Business operations must demonstrate effective security management over regulatory
compliance, audit, and good business practices. Failure in compliance or audit poses
severe risks to the continued existence of the business.
Name Regulation/Compliance
Statement Security solutions should include mechanisms to configure and monitor systems for
regulatory compliance.
Rationale Regulations drive many requirements in IT security projects, and regulations change
over time. To handle this, flexible support is required for the constraints set by
government regulations and industry standards and traceability between regulations,
standards, and business policies and the security policies used to implement them.
Implications Ensuring continued compliance and regulatory alignment must be considered when
completing any security solution.
Use of automated compliance set-up and monitoring will facilitate updates to keep track
of regulatory changes and monitoring to maintain continuity of compliance.
Name Privacy
Statement Security solutions should include mechanisms to implement policy on privacy.
14. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 14
Name Privacy
Rationale In the current age of data sharing, privacy becomes increasingly important. Solutions
should highlight the use of private information and corresponding data protection control
mechanisms, and enable the principles of notice, choice, and access. Administrator
access must also be subject to these controls. This principle demands particular
attention in Cloud and SOA requirements, where privacy must be applied to all points in
the provision of each service.
Implications The enterprise needs to implement applicable privacy policies, both regulatory and best
practice, and monitor whether they conform to them.
Name Compartmentalization
Statement Resources should be protected at separated levels appropriate to their value,
confidentiality, integrity, and accountability classification.
Rationale Information assets should be isolated based on data classifications, with access to
these assets based on similar criteria. Networks should be segmented based on user
communities. Compartmentalizing assets and networks provides an additional layer of
defense and control.
Implications Mechanisms providing separation of impact of loss in the event of a security breach add
significantly to the overall security level afforded in any architecture.
Name Separation of Management Services
Statement Security services for management, enforcement, and accountability should be delivered
as separate functions through separate authorities.
Rationale Security management services (identity, authentication, authorization, audit, etc.)
should be shared by multiple applications within the security infrastructure, enabling
consistent monitoring and enforcement. The enforcement itself (through cryptography,
or policy enforcement, or physical isolation) is typically distributed and kept as close as
possible to the resources.
Implications Segregation of provision of security services is an important security control
mechanism, in the same way as it is in provisioning services in the physcal world.
Name Separation of Duties
Statement Security operations should enforce separation of duties.
Rationale Security operations should enforce separation of duties, so that, for example, software
developers should not have access to running production systems. Similarly, broad
administrative access should be restricted as much as possible (the Least Privilege
principle), with individuals holding administrative access to only the those subsystems
where they have appropriate roles.
Permissions, keys, privileges, etc. must ultimately fall under independent control,
otherwise there will always be a weakest link at the top of the chain of trust.
Implications Segregation of allocation of security functions is an important security control
mechanism, in the same way as it is when designing operating procedures for humans.
15. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 15
Interoperability
Name Least Privilege
Statement A principal should have only the privileges required to carry out its specified task.
Rationale An entity granted entitlement to access an asset should only be given sufficient access
rights to perform the operation for which rights were granted, and no others.
Implications Requires clear classification of resources and permission levels for constraining access
and authorization to perform operations only to the required extent.
Name Agility and Extensibility
Statement Security solutions should include agility and management mechanisms to
accommodate extensibility.
Rationale Business demands that security enables business agility and is cost-effective to
implement. Component-based solutions support separation of the management of
mechanisms themselves, to support a variety of mechanisms under the same
framework. Already deployed solutions should allow for the addition and extension of
new mechanisms within the existing management framework.
Implications Globalization and scalability are key considerations in architecting systems, particularly
for use in business collaborations, including multi-nationally.
Name Consumability
Statement Security solutions should include management mechanisms to accommodate
consumability.
Rationale All security services must be easily consumable by a variety of audiences. This includes
programmers who develop and integrate applications with the security services,
management systems that create, update, and manage security policies and other
security artifacts, and people who manage security activities, audit security activities,
and manage access to protected resources.
Implications Consumability is best achieved by security following human behaviors.
16. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 16
Cloud and SOA Security Principles
Beyond the General Security Principles, the following Security Principles are considered specifically relevant
to assuring security in architecting Cloud and SOA environments.
Name Weakest Link
Statement Adding to the Weakest Link principle, this principle has particular application to Cloud
and SOA.
Rationale This principle has particular application to Cloud and SOA, in that it encourages use of
a mediation layer to control access to services, as opposed to each individual
application managing its own authentication and authorization.
Implications This principle has specific impact on the approach to architecting for Cloud and SOA.
Name Off-line Backup
Statement It must be possible for Cloud tenants to make a back-up of their data on another
environment of their choice.
Rationale A back-up provides the tenant extra certainty to be able to access his data in case of an
emergency such as inaccessibility of the Cloud system.
Implications Availability is a key requirement in the CIA objectives for effective security. Accordingly,
an enterprise needs to protect itself from external failures resulting in access to its data
and processing resources becoming unavailable.
Name Policy-based Access to Services
Statement Service consumption will be controlled by policy. Policies must be held externally from
applications.
Rationale Where services are accessed in a distributed environment, the policies applying to
those services should not be accessible from those services.
Implications Separate policy from implementation.
Name Data Protection
Statement Data protection should allow compliance with corporate or regulatory compliance
standards and practices, implemented in a manner that supports the other principles for
Cloud and SOA, such as policy-based access, federation, multi-tenancy, etc.
Rationale Specific attention should be paid to the end-to-end data flows to ensure no gaps are
present. Collection and provision of data in transit must also be appropriately protected.
Data protection should also include consideration for back-up and recovery,
e-discovery, etc.
Implications In distributed environments, data flows are often complex, so need to be handled in
flexible ways which provide acceptable compromises with other applicable data
protection principles.
17. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 17
Name Privacy
Statement Extending the Privacy principle, protection of private information must demonstrate
compliance with the enterprise's requirements for such protection across all points
providing each service.
Rationale Adding to the Privacy principle, this principle demands particular attention in Cloud and
SOA requirements, where privacy must be applied to all points in the provision of each
service.
Implications This principle has specific impact on the approach to architecting for SOA.
Name Multi-tenancy
Statement A Cloud Computing model must support tenant and solution isolation among multiple
tenants of the Cloud.
Rationale Cloud Computing stores clients’ assets (information and operational processes
applications) in servers distributed “who knows where”, so it is critical that each client’s
assets are kept securely separated from the assets of other clients, irrespective of the
storage media and processing resources that each client may also use in the Cloud.
Implications Cloud providers offer assurances that they provide secure isolation between the assets
of each of their clients. While this is difficult for them to evidence, their isolation control
mechanisms seem to demonstrate success over this capability.
Name Data Evacuation
Statement A user of Cloud Computing must be able to request its data be removed in its entirety
from the Cloud on terminating use of it and be assured that no data is left behind in an
accessible state.
Rationale A principle of security is that once an asset leaves your locus of control, you cannot
control where it goes, and can then only exercise “management” over its security. One
aspect of this management is gaining assurance from a Cloud Provider that when you
have finished using their Cloud, you can take back all the assets of value that you put
into it. Against a background where forensics on stored media demonstrates how
meaningful data can be retrieved even though it was supposed to have been deleted,
clients expect their Cloud Providers to demonstrate adequate assurances that their
operations in the Cloud are fully removed.
Implications A situation where small remnants of data tracing past storage and processing activities
remain; those remnants are called “breadcrumbs”.
Forensics can rebuild meaningful information from those breadcrumbs, which then
compromises the confidentiality of the party whose breadcrumbs were left.
Name Intellectual Property
Statement A Cloud Computing model must support the notion that a user’s intellectual assets
(capital/property) and individuals’ or organizations’ innovations are protected
contractually and where possible also technically, and respected by its Cloud hosting
providers and/or their associated supply chain, including residual knowledge and
experience-based knowledge.
Rationale Intellectual Property Rights (IPR) is a high-value asset for any enterprise, so any
operation in the Cloud where IPR applies over the client’s data or over the client’s
processing operations performed on that data, must remain in the exclusive ownership
of the client, with none residing at any point with the Cloud or service provider.
18. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 18
Name Intellectual Property
Implications An enterprise’s business managers and their legal advisors must be consulted on every
occasion where a proposal to use the Cloud involves moving IPR assets into the Cloud,
and decide whether their IPR is at acceptable risk before approving doing so.
Name Accountability in Service-based Architectures
Statement Security design in SOA/Cloud architectures should include collection and provision of
audit information on system operations.
(See also Accountability.)
Rationale Service consumers must provide service providers with sufficient information to allow
them to fulfil their obligations in this regard both to the consumer and to regulation.
Conversely, providers are responsible for logging all information required by the
consumers for business or regulatory audit purposes.
Implications Business operations must demonstrate effective security management over regulatory
compliance, audit, and good business practices. Failure in compliance or audit poses
severe risks to the continued existence of the business.
19. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 19
Other Sources
Most organizations who develop their own IT architectures have their own in-house Security Principles
which guide their IT architecture designers.
A web search will find many references to sources of Security Principles. We suggest the following as
recommended published sources.
ISO/IEC 27001
ISO/IEC 27001:2005: Information Technology – Security Techniques – Information Security Management
Systems – Requirements. This standard lists Security Principles under the following headings:
• Security Policy
• Security Organization
• Asset Classification and Control
• Personnel Security
• Physical & Network Management
• Access Control
• Systems Development & Maintenance
• Business Continuity
• Audit & Compliance
NIST
NIST Special Publication 800-27: Engineering Principles for Information Technology Security, by Gary
Stoneburger, Clark Hayden, & Alexis Feringa, June 2004; refer to:
http://csrc.nist.gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf. This document describes a number
of good engineering principles.
NIST Special Publication 800-14: Generally Accepted Principles & Practices for Securing Information
Technology Systems, by Marianne Swanson & Barbara Guttman, September 1996; refer to:
http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf.
Joint ISF, (ISC)2, and ISACA
Principles for Information Security Practitioners, 2010; refer to: www.isaca.org/Knowledge-
Center/Standards/Pages/Security-Principles.aspx. This document sets out security principles under three main
headings:
• Support the Business
• Defend the Business
• Promote Responsible Security Behavior
20. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 20
OECD
Guidelines for the Security of Information Systems and Networks – Towards a Culture of Security, July
2002; refer to: www.enisa.europa.eu/act/rm/cr/laws-regulation/corporate-governance/oecd-guidelines. This
document presents guidelines to any OECD entities (governments, businesses, other organizations, and
individual users) who develop, own, provide, manage, service, and use information systems and networks.
The Jericho Forum®
The Jericho Forum®
Commandments (December 2006) define both the areas and the principles that must be
observed when planning for a de-perimeterized future. Whilst building on “good security”, the
commandments specifically address those areas of security that are necessary to deliver a de-perimeterized
vision. In this regard, these “commandments” build on the good Security Principles in this White Paper.
The Jericho Forum®
Identity, Entitlement, and Access Management (IdEA) Commandments (May 2011)
define the principles that must be observed when planning an identity eco-system. Whilst building on “good
practice”, these commandments specifically address those areas that will allow “identity” processes to
operate on a global, de-perimeterised scale; this necessitates open and interoperable standards and a
commitment to implement such standards by both identity providers and identity consumers.
21. Security Principles for Cloud and SOA
www.opengroup.org A White Paper Published by The Open Group 21
About the Authors
Lead Author
Ian Dobson (The Open Group) – lead editor during development of this White Paper. Ian is the Forum
Director for The Open Group Security Forum, and the Jericho Forum, a Forum of The Open Group.
Base Document
Tony Carrato (IBM) – provided the base document from which these Security Principles were developed.
Tony is Chief Product Architect – Smarter Cities, Industry Solutions Development, IBM Software Group.
Lead Reviewers
Omkhar Arsasratnam (IBM) – Chair of the Cloud & SOA Security Project of The Open Group Cloud
Computing Work Group, and joint project leader for this White Paper.
Stuart Boardman (Getronics) – Vice-Chair of the Cloud & SOA Security Project of The Open Group Cloud
Computing Work Group, and joint project leader for this White Paper.
Other Reviewers
Notable among the project members who contributed review feedback on these Security Principles were
Stephen G. Bennet (Oracle), Peter Johnson (Eli Lilly), Michiel Perdeck (Logica), and Robert S Tucker
(Shell).
About The Open Group
The Open Group is a global consortium that enables the achievement of business objectives through IT
standards. With more than 400 member organizations, The Open Group has a diverse membership that spans
all sectors of the IT community – customers, systems and solutions suppliers, tool vendors, integrators, and
consultants, as well as academics and researchers – to:
• Capture, understand, and address current and emerging requirements, and establish policies and share
best practices
• Facilitate interoperability, develop consensus, and evolve and integrate specifications and open source
technologies
• Offer a comprehensive set of services to enhance the operational efficiency of consortia
• Operate the industry’s premier certification service
Further information on The Open Group is available at www.opengroup.org.