New standard/tool address security dependencies

There's a need to rely and trust forces outside our direct control for security -- and that awareness spurred the United Kingdom's national infrastructure protection authority to push for a standard way to model the implications of relying on technology, services, people and more.

The U.K. Centre for Protection of National Infrastructure, a government authority that provides security advice to business and organizations to protect against both physical threats and cyberthreats, asked the standards organization Open Group to create a method that anyone (including outside of the U.K.) can use to model dependencies they have in terms of security. The Open Group has done that with its "Dependency Modeling Standard" published this week, plus a prototype software tool from U.K.-based firm Intradependency that can be used to define dependence on systems, whether it's a network of physical sensors or a supply chain.

RELATED: Trustworthy systems, trustworthy vendors and how to identify them

The U.K. government wants to use the modeling standard to help clearly define dependencies in the military sphere, but it's also supposed to be useful for enterprises that depend on energy supplies, goods and services from partners or other relationships in order to operate.

"What is the business goal? What do you want to achieve?" said Richard Byford, senior director at Intradependency about what the Dependency Modeling Standard and the software tool for it are intended to do. "It's a way of understanding what needs to be there to create success." The modeling tool, still in prototype, makes use of XML to import data to model dependency scenarios.

With cloud-based services and mobile adding more complexity to the IT environment, the tool should be useful to model this, too. Ian Dobson, director of the Open Group's Security Forum and Jericho Forum, says the intent is to build resilience in operations to cope with issues that arise based on what you depend on.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: @MessmerE. Email: emessmer@nww.com.

Read more about wide area network in Network World's Wide Area Network section.

Tags critical infrastructure protectionsecurityIT SecurityOpen Group

Comments

Comments are now closed

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Enterprise Virtualisation Security

Deep Security provides a comprehensive Server Security Platform giving organisations advanced protection for Physical, Virtual, and Cloud Servers.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.