- From: Joseph Hui <Joseph.Hui@exodus.net>
- Date: Wed, 8 May 2002 15:06:49 -0700
- To: "Darran Rolls" <Darran.Rolls@waveset.com>, "Christopher Ferris" <chris.ferris@sun.com>, <www-ws-arch@w3.org>
Darran, What are the security primitives you use for Auditing? Also, are you making the argument for 1) making Auditing as a req per se; or 2) making Auditing a req and elevating it to a "Security Aspect/Facet" in the process? Regards, Joe Hui Exodus, a Cable & Wireless service ============================================== > -----Original Message----- > From: Darran Rolls [mailto:Darran.Rolls@waveset.com] > Sent: Wednesday, May 08, 2002 12:32 PM > To: Christopher Ferris; www-ws-arch@w3.org > Subject: RE: D-AR006.11 discussion points > > > I can say that as a vendor of security products, security > relevant audit > is considered by most as an integral part of a unified security > infrastructure. I would second including this. > > As you are all no doubt aware, the AuthN and AuthZ are very often > included with Audit and Administration to form the "Four A's" of > security. I would like to propose we also include the fourth 'A' for > Administration. > > The last two 'A's are often ignored as they are focused on the onward > operation of a deployed service. Ignoring the last two A's will > doubtlessly restrict rollout, adoption and general success of a WS > initiative. I therefore propose adding "Administration" to the 6. > > For the spaghetti western fans out there may I now say "and then there > were 8" doo, doodle, doodle oo ;-) - Magnificent Seven - 1960 > > -------------------------------------------------------- > Darran Rolls http://www.waveset.com > Waveset Technologies Inc drolls@waveset.com > (512) 657 8360 PGP 0x8AC67C6F > -------------------------------------------------------- > > > -----Original Message----- > From: Christopher Ferris [mailto:chris.ferris@sun.com] > Sent: Wednesday, May 08, 2002 2:00 PM > To: www-ws-arch@w3.org > Subject: Re: D-AR006.11 discussion points > > Joe/Ayse, > > 1) Please keep this, and all technical discussion, on the public > mailing list. > > 2) It seems to me that Joe is suggesting that the bulleted > item under D-AR006.11 that says: > > "There are six aspects in the security framework for Web Services > architecture: Accessibility, > Authentication, Authorization, Confidentiality, Integrity, and > Non-repudiation. Together they form > the foundation for secure Web Services." > > is actually a separate requirement from D-AR006.11 and should > have been > labeled D-AR006.12 in the document. Am I reading this > correctly? If so, > then this needs to be fed to the editors as a comment so that it is > certain to be tracked (and fixed in the next editor's draft). > > The question I have then is whether or not Joe is accepting > Ayse's request to add Auditing to this list of 6 aspects > or whether he is suggesting that yet another requirement > (D-AR006.13) be created to accomodate Auditing... do any others > have an opinion on this? > > Thanks, > > Chris > > Joseph Hui wrote: > > >>From: Dilber, Ayse, ALASO [mailto:adilber@att.com] > >> > > [snip] > > > > > >>D-AR006.11 the six aspects need to be replaced with the > >>following seven aspects of the security framework: > >> > > > > Ayse, the D-AR006.11 number was taken. > > You may want to re-number your proposal as D-AR006.12 instead > > if you're serious about it (to be voted on or debated). > > > > > >>Auditing; > >> > > > > Auditing* as a security aspect? > > Can you explain why? E.g. for starter, how would you > > characterize the threat (model) that's unique to Auditing? > > Note that the impetus for requiring each of the original > > six begins with a unique threat, or in some cases, threats. > > > > > >>Authentication (includes identification and authorization); > >> > > > > Authc & Authz are separate sec aspects. > > > > Example 1: The security policy of the very system that you're > > using probably includes only Authz but not Authc. To login, > > you simply enter user name and password, the system checks > > the password file and lets you in. You are not asked to > > authenticate yourself as Ayse. BTW, password file is known > > to be one form of Access Control List (ACL). > > > > Example 2: Alice's security policy includes Authc & Authz. > > To join Alice's party, Bob must present a certificate to > > Alice to authenticate himself as Bob -- Authc, AND, after > > successful authc (sometimes aka positive identification), > > Alice checks whether Bob is on her guest list (i.e. ACL) > > before allowing him into her party. > > > > > >>Access Control (file permission, etc.); > >> > > > > Access Control is just a Authz means. (See example 2 above.) > > > > Cheers, > > > > Joe Hui > > Exodus, a Cable & Wireless service > > ======================================================== > > > > > >>Confidentiality; > >>Availability; Integrity; Non-repudiation. > >>Thanks, > >>Ayse > >> > >>-----Original Message----- > >>From: Christopher Ferris [mailto:chris.ferris@sun.com] > >>Sent: Saturday, May 04, 2002 10:00 AM > >>To: wsawg public > >>Subject: D-AR006.11 discussion points > >> > >> > >>SUNW: This requirement goes "inside" a web service and places > >>requirements > >>on how it is designed. We should be focusing on externally > observable > >>(through the web service interfaces) behaviour > >> > >>SYBS: Implementation details. Don't seem to fit in Web > >>Services Architecture > >>group.. > >> > >>W3C: See > >>http://lists.w3.org/Archives/Public/www-ws-arch/2002May/0015.html > >> > >>ORCL: I don't quite see how "an architecture" can actually > provide an > >>interface. And in this case the goal may be too ambitious given the > >>number of different possible "infrastructures". > >> > >>PF: I just don't see the need for this. > >> > >>TIB: not clear to me that individual Web services would ever want to > >>know whether they were under DOS at some lower layer > >> > >>CrossWeave: Don't understand this > >> > >>CMPQ: The interface is for negotiating services that an > >>infrastructure may > >>provide to, or perform on behalf of, a requesting Web Services. > >>Such value-added services may include: security, content delivery, > >>QoS, etc. For instance, a Web service may instruct (via the > >>interface) the security > >>agents of its infrastructure to defend against DOS/DDOS > >>attacks on its behalf. > >> > >>This seems to say that the requirement is > >>"The security framework must provide for negotiations pertaining to > >>security considerations." > >> > >>That is, the requirement is for negotiation support; within > >>security context, > >>it is security negotiation, within QoS context, it is QoS > >>negotiation, etc. > >> > >> > >> > > > > > > >
Received on Wednesday, 8 May 2002 18:06:36 UTC