1 / 9

De-Perimeterisation

De-Perimeterisation. Introducing the first major security paradigm shift of the 21 st Century. What’s in a name?. De-Perimeterisation (Royal Mail, ICI) Re-Perimeterisation (more accurate alternative) Radical Externalisation (BP) Use of public infrastructure (DuPont)

Download Presentation

De-Perimeterisation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. De-Perimeterisation Introducing the first major security paradigm shift of the 21st Century

  2. What’s in a name? • De-Perimeterisation (Royal Mail, ICI) • Re-Perimeterisation (more accurate alternative) • Radical Externalisation (BP) • Use of public infrastructure (DuPont) • Boundaryless information flow (Open Group) • Not all the same thing – some definitions required

  3. What does it mean to me? De-Perimeterisation • Secure access anytime, anyplace, anywhere – via private or public networks • Maximum network agility – instant connectivity for clients and partners • Strong authentication, authorisation, data integrity, encryption and non-repudiation – where required • Centralised, seamless management of all components • Not yet achievable and requires extensive planning

  4. What’s needed to realise this vision De-Perimeterisation • Industry standards to maintain trust levels across trading partners • Consistent user authentication standards • Classification schemes for users, data, systems and connections • Agreed protocols and strengths of mechanisms • Assurance processes to build trust across organisational boundaries

  5. Authorisation Identification Edge components Secure communications Policy negotiation Authentication Local components Management framework Rights management Availability monitoring De-Perimeterisation Audit Interface standards Platform devices Data Classifications Appliances Operating systems Embedded computing Connectors Code The full scope of the standards we could develop

  6. Security architecture for the information age • “A good, modern security architecture is ragged around the edges, full of holes and exists largely in people’s heads” • David Lacey • Royal Mail Group

  7. Decisions, decisions De-Perimeterisation • Objectives for 2004 and beyond • Who will do what • How we will operate • Public relations • Future membership • Voting rights • Name of circle

  8. The choice is yours De-Perimeterisation

  9. Coming your way soon… Spy vs Spy The second major security paradigm shift of the 21st Century

More Related