New standard/tool address security dependencies

There's a need to rely and trust forces outside our direct control for security -- and that awareness spurred the United Kingdom's national infrastructure protection authority to push for a standard way to model the implications of relying on technology, services, people and more.

The U.K. Centre for Protection of National Infrastructure, a government authority that provides security advice to business and organizations to protect against both physical threats and cyberthreats, asked the standards organization Open Group to create a method that anyone (including outside of the U.K.) can use to model dependencies they have in terms of security. The Open Group has done that with its "Dependency Modeling Standard" published this week, plus a prototype software tool from U.K.-based firm Intradependency that can be used to define dependence on systems, whether it's a network of physical sensors or a supply chain.

RELATED: Trustworthy systems, trustworthy vendors and how to identify them

The U.K. government wants to use the modeling standard to help clearly define dependencies in the military sphere, but it's also supposed to be useful for enterprises that depend on energy supplies, goods and services from partners or other relationships in order to operate.

"What is the business goal? What do you want to achieve?" said Richard Byford, senior director at Intradependency about what the Dependency Modeling Standard and the software tool for it are intended to do. "It's a way of understanding what needs to be there to create success." The modeling tool, still in prototype, makes use of XML to import data to model dependency scenarios.

With cloud-based services and mobile adding more complexity to the IT environment, the tool should be useful to model this, too. Ian Dobson, director of the Open Group's Security Forum and Jericho Forum, says the intent is to build resilience in operations to cope with issues that arise based on what you depend on.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: @MessmerE. Email: emessmer@nww.com.

Read more about wide area network in Network World's Wide Area Network section.

Tags: critical infrastructure protection, security, IT Security, Open Group

Google introduces Chrome 'factory reset' pop-ups to tackle extensions hijacks

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Open Space Security Suite

Kaspersky Open Space Security provides complete business protection in a single integrated suite of applications that work seamlessly across all platforms.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.