90 likes | 182 Views
Explore the groundbreaking shift in security with De-Perimeterisation, offering secure access anytime, anywhere, with strong authentication and seamless management. Understand the standards and components needed to achieve this vision. Dive into security architecture for the information age and decision-making processes for future operations.
E N D
De-Perimeterisation Introducing the first major security paradigm shift of the 21st Century
What’s in a name? • De-Perimeterisation (Royal Mail, ICI) • Re-Perimeterisation (more accurate alternative) • Radical Externalisation (BP) • Use of public infrastructure (DuPont) • Boundaryless information flow (Open Group) • Not all the same thing – some definitions required
What does it mean to me? De-Perimeterisation • Secure access anytime, anyplace, anywhere – via private or public networks • Maximum network agility – instant connectivity for clients and partners • Strong authentication, authorisation, data integrity, encryption and non-repudiation – where required • Centralised, seamless management of all components • Not yet achievable and requires extensive planning
What’s needed to realise this vision De-Perimeterisation • Industry standards to maintain trust levels across trading partners • Consistent user authentication standards • Classification schemes for users, data, systems and connections • Agreed protocols and strengths of mechanisms • Assurance processes to build trust across organisational boundaries
Authorisation Identification Edge components Secure communications Policy negotiation Authentication Local components Management framework Rights management Availability monitoring De-Perimeterisation Audit Interface standards Platform devices Data Classifications Appliances Operating systems Embedded computing Connectors Code The full scope of the standards we could develop
Security architecture for the information age • “A good, modern security architecture is ragged around the edges, full of holes and exists largely in people’s heads” • David Lacey • Royal Mail Group
Decisions, decisions De-Perimeterisation • Objectives for 2004 and beyond • Who will do what • How we will operate • Public relations • Future membership • Voting rights • Name of circle
The choice is yours De-Perimeterisation
Coming your way soon… Spy vs Spy The second major security paradigm shift of the 21st Century