Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How is the security system secured from attackers? #15

Open
MitchellJThomas opened this issue Oct 29, 2020 · 6 comments
Open

How is the security system secured from attackers? #15

MitchellJThomas opened this issue Oct 29, 2020 · 6 comments

Comments

@MitchellJThomas
Copy link
Contributor

MitchellJThomas commented Oct 29, 2020

Who or what is securing the security system?
What happens when malware is introduced into this system? If it's connected to everything that seems like a great vector to create a lot of damage.

Idea: Borrow context and components from NIST's Zero Trust Architecture. Say assume an identity provider, user/role based encryption, message authentication codes and a risk posture system that allows for self assessment to occur.

@warrenrjwc
Copy link
Contributor

What is the intention of this suggestion? I am not clear on what we want to use this for. Is this a suggested use case?

@MitchellJThomas
Copy link
Contributor Author

My intention is to create discussion about establishing and maintaining trust in a system critical to operations, mainly to reach clarity around whether the architecture provides or requires those trust components. Ignoring this we run the risk of designing a vulnerable system.

@adammontville
Copy link
Contributor

It's a good idea to look at this.

@JasonKeirstead
Copy link
Member

JasonKeirstead commented Nov 5, 2020

I think we need to be a bit careful about getting into the weeds here. Not all cybersecurity operation stacks run in a zero trust model nor would we want to suggest that should even be required.... it would immediately limit the applicability of our work to only those organizations who are embracing such a model, which are still somewhat rare. Also, this is very application-stack specific. Two systems in the architecture may secure their communication channel many different ways.

@adammontville
Copy link
Contributor

I agree that we don't want to be so forward looking that we lose the ability to transition. Perhaps there's still something we can glean from looking at a zero trust architecture. Are there decisions we could make to day that would hinder embracing that model in the future? Are there base components in a zero trust architecture that are prevalent enough today to consider including/assuming?

@sparrell
Copy link
Contributor

I agree we should be looking at the question "how do you secure OCA systems?" As the original point made is valid that security systems are prime target. I agree with the comment that there are different ways to do this and different needs for different use cases and different legacy architectures. I recommend against getting too prescriptive too soon. We might want to start by gathering examples of how you could do OCA system security. And we should look at all aspects. Personally I'd start with some recursive aspects of the system feeding itself especially in any proof of concept. E.g. drink our own champagne

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants