90 likes | 176 Views
De-Perimeterisation. Introducing the first major security paradigm shift of the 21 st Century. What’s in a name?. De-Perimeterisation (Royal Mail, ICI) Re-Perimeterisation (more accurate alternative) Radical Externalisation (BP) Use of public infrastructure (DuPont)
E N D
De-Perimeterisation Introducing the first major security paradigm shift of the 21st Century
What’s in a name? • De-Perimeterisation (Royal Mail, ICI) • Re-Perimeterisation (more accurate alternative) • Radical Externalisation (BP) • Use of public infrastructure (DuPont) • Boundaryless information flow (Open Group) • Not all the same thing – some definitions required
What does it mean to me? De-Perimeterisation • Secure access anytime, anyplace, anywhere – via private or public networks • Maximum network agility – instant connectivity for clients and partners • Strong authentication, authorisation, data integrity, encryption and non-repudiation – where required • Centralised, seamless management of all components • Not yet achievable and requires extensive planning
What’s needed to realise this vision De-Perimeterisation • Industry standards to maintain trust levels across trading partners • Consistent user authentication standards • Classification schemes for users, data, systems and connections • Agreed protocols and strengths of mechanisms • Assurance processes to build trust across organisational boundaries
Authorisation Identification Edge components Secure communications Policy negotiation Authentication Local components Management framework Rights management Availability monitoring De-Perimeterisation Audit Interface standards Platform devices Data Classifications Appliances Operating systems Embedded computing Connectors Code The full scope of the standards we could develop
Security architecture for the information age • “A good, modern security architecture is ragged around the edges, full of holes and exists largely in people’s heads” • David Lacey • Royal Mail Group
Decisions, decisions De-Perimeterisation • Objectives for 2004 and beyond • Who will do what • How we will operate • Public relations • Future membership • Voting rights • Name of circle
The choice is yours De-Perimeterisation
Coming your way soon… Spy vs Spy The second major security paradigm shift of the 21st Century