Security Working Group

Slides:



Advertisements
Similar presentations
USPTO Seal Patent Public Advisory Committee Meeting John B Owens II Chief Information Officer July 8, 2010.
Advertisements

U.S. Department of Agriculture eGovernment Program February 2004 eAuthentication Integration Status eGovernment Program.
Steering Committee CSRIC Working Group 2A Cyber Security Best Practices October 7, 2010.
SMART METER TEXAS Status Update July 29, AGENDA Release 1 Smart Meter Texas Online Portal Update – SMT Solution Update – Registration Statistics.
SMART METER TEXAS Status Update May 5, AGENDA Release 1 Smart Meter Texas Online Portal Update – SMT Solution Update – Registration Statistics –
SMART METER TEXAS Status Update June 3, AGENDA Release 1 Smart Meter Texas Online Portal Update – SMT Solution Update – Registration Statistics.
Targets for project progress 2015: graduation review – clear documentation and PoC implementation specify general framework and API requirements gap analysis.
DGC Paris WP2 Summary of Discussions and Plans Peter Z. Kunszt And the WP2 team.
State of Georgia Release Management Training
Doc.: IEEE /054r0 Submission January 2003 Dr. John R. Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
K. Long, 25 June, 2016 IDR: structure and overall timeline: Slides are to introduce discussion of how we prepare IDR. Propose to revise slides as we discuss.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Use Cases Discuss the what and how of use cases: Basics Examples Benefits Parts Stages Guidelines.
Security Working Group
Command Microservice Deep Dive
Meta Data Deep Dive Part 1
ArcGIS for Server Security: Advanced
Security Working Group
Security Working Group
Export Services Deep Dive
Module 4: Structuring the District Implementation Team for Success
Project Management.
Core, Device Service, Application Breakout
Office 365 Security Assessment Workshop
Security Working Group
E-Learning Advisory Group Meeting
Outcome TFCS-05 // May OICA, Paris
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Possible options of using DDS in oneM2M
Global Grid Forum GridForge
Collaboration Program Update
Meta Data Deep Dive Part 2
WPM ad-hoc group report TP#24
WPM ad-hoc group report TP#25
Auditing Cloud Services
StratusLab Project Status
Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
Meta Data Deep Dive Part 1
Instructor Course Evaluation (ICE)
Power BI Security Best Practices
Core, Device Service, Application Breakout
Software Documentation
Instructor Course Evaluation (ICE)
Weekly Meeting 2018 Jan 24 Security.
Outcome TFCS-11// February Washington DC
Patent Public Advisory Committee Meeting
Wireless Coexistence TAG Overview
Guidance notes for Project Manager
Organization for the Advancement of Structured Information Standards
IS&T Project Reviews September 9, 2004.
Security Guidelines Working Group Update
Patent Public Advisory Committee Meeting
Wireless Coexistence TAG Overview
Platform Architecture
IEEE IETF Liaison Report
Supporting Institutions Towards a Shibbolized Infrastructure
Tax Software Development in a Multi-Jurisdictional Environment
Status of U.S.-EU Bilateral Agreement
The Sakai Project and Partnership
Ctclink executive leadership committee May 31, 2018
Access Controls in Smart Cars: Needs and Solutions
Introduction to Portal for ArcGIS
Project Overview.
Shared Infrastructure
Notes on TGu liaison November 2005 Date: Authors:
QoS Metadata Status 106th OGC Technical Committee Orléans, France
Fy ‘08 NETWORK PLANNING TASK FORCE
LMS Transition to Canvas
CalACES JPA Board of Directors Meeting February 22, 2018.
IoT Security and Privacy
Presentation transcript:

Security Working Group 2017 July 07 Conference Call

2017 July 07 - Agenda Review last Security Working Group (SWG) meeting notes Discuss Today Meeting Action Plan

Review - 2017 June 1-2 Actions Plan Agreed to process All members to review the EdgeX Architecture Identity threat surfaces Define mitigation plan for threats Review and comment on existing Security Requirements document – Security Requirements for Fuse IoT Gateway Software (Dated: January 27, 2017) Provided review comments by 2017 July 11. To be sent by email using Sec WG alias. Conference call to discuss all comments on 2017 July 18 at 10:00 AM (US Eastern Standard Time)

Review - 2017 June 1-2 Actions Plan Post Security Requirements Review Prioritize requirements Identify security MVP functionality for beta Define milestones Assign owners and implement MVP Additional Agreements Focus on APIs so that vendors can provide plug-ins Open Source core will provide basic security services APIs will replace basic solutions with more advanced implementations Need to collaborate with Core Architecture and System Management WG Concerns The scope seems broad with large amount of work Not clear if the group has sufficient resources and what can be delivered by beta deadline. Need to assess after security requirements review.

Review - Security Working Group Governance Plans Team structure and communication Current SWG Chairman: John Walsh (role will rotate every 6 months) Email alias: edgex-tsc-security@lists.edgexfoundry.org Wiki: https://wikiedgexfoundry.org/display/FA/Security_Working_Group

2017 July 07 - Agenda Need teams to review and provide written comments on existing security requirements by July 11 Discuss current security requirements comments/changes Discuss which members have content, products and personnel that are relevant to each element in Security MVP

Barcelona MVP Plan The Barcelona MVP Status & Plan Next EdgeX Release named Barcelona MVP to focus minds on target release date to coincide with IOT Solutions World Congress, Barcelona 3rd- 5th October 2017 http://www.iotsworldcongress.com/ Barcelona MVP Draft Project Plan in Progress now released and available at EdgeXBarcelonaPlanJune2017_v1(draft).gan . Please note to view the full plan you will need to install the FREE Gantt tool from http://www.ganttproject.biz/

Barcelona MVP Plan 13 Week Development Interval starting 7/9/17

Barcelona MVP Resource Plan

Fuse Arch.

Security Discussion Points - Barcelona MVP “Fuse microservices to enforce access control, authentication, and authorization (AAA).” - Needs to support smart end points to cloud (AAA) Need to support tunneled and encrypted sensor data to the cloud – Gateway in passthrough mode only. Specifies Gateway administrator provisions devices. Should it allow for smart devices? “Rely on installation-unique credentials for protecting access to any of the Fuse repositories.” - Smart end points support (certificate, authentication, integrity, optional encryption) “Documentation provided with Fuse should strongly recommend that implementers expose HTTPS only.” – Needs to require TLS 2.0 or higher, down grade to unsecure modes should be flagged as insecure by EdgeX. “For those subscribers of MQTT data, there is no ability to protect sensitive data in transit” – This statement is in error. Typical protection is provided by a TLS layer that MQTT is tunneled through. Mangement Use Cases “EdgeX Administrator updates software” – Does everyone agree that this is only the EdgeX software upgrade and not end devices? Control Use Cases “EdgeX published all data” – This disallows smart devices from publishing data – This seems too restrictive.

Conclusion – The End Review action items Review agreements Review Next steps Review and comment on existing Security Requirements document – Security Requirements for Fuse IoT Gateway Software (Dated: January 27, 2017) Provided review comments by 2017 July 11. To be sent by email using Sec WG alias.