Guide: Jericho Forum Self-Assessment Scheme
Guide: Jericho Forum Self-Assessment Scheme
You are free to copy, distribute, display, and perform the work, subject to appropriate attribution (the Jericho Forum),
except that in addition you may make derivative works, providing such works do not claim to be endorsed by the Jericho
Forum.
This document has not been verified for avoidance of possible third-party proprietary rights. In implementing this
document, usual procedures to ensure the respect of possible third-party intellectual property rights should be followed.
Guide
®
Jericho Forum Self-Assessment Scheme
Comments relating to the material contained in this document may be submitted to:
3 Self-Assessment Template...........................................................................................................7
®
Jericho Forum Self-Assessment Scheme iii
Preface
The Jericho Forum
The Jericho Forum is a Managed Consortium of The Open Group. Founded in January 2004,
the Jericho Forum is an international IT security thought-leadership group dedicated to defining
ways to deliver effective IT security solutions that will match increasing business demands for
secure IT operations in our open, Internet-driven, globally networked world. Its members include
multi-national corporate user organizations, major security vendors, solutions providers, and
academics, all working together to:
By 2008, the Jericho Forum had raised industry awareness of the major information security
challenges that increasing erosion of corporate boundaries was creating, published its
commandments (design principles) on requirements for effective information security in de-
perimeterized environments. It also published a number of requirements papers explaining de-
perimeterization and effective security responses. In these papers, the requirement for
information-centric security – moving the protection close to the data asset – is a key objective.
In January 2009, the Jericho Forum published its Collaboration Oriented Architectures (COA)
Framework for developing secure architectures for de-perimeterized environments.
Current activities are focused on maturing the COA Framework solution space, and analyzing
requirements for enabling secure business collaboration in the de-perimeterized environment
that Cloud Computing represents. In April 2009, the Jericho Forum published its Cloud Cube
Model, which assessed the Cloud Computing space from the viewpoint of a business manager
assessing the risks and benefits of extending business operations and collaborative partnerships
into different types of cloud. It is building on this with developments in several related areas, one
in particular being Identity and Access Management, as part of the essential security
infrastructure for managing business collaborations in de-perimeterized environments. It has
established its own collaborative partnerships with other expert groups – including the Cloud
Security Alliance – to share knowledge and experience in influencing development of effective
information security solutions.
The Jericho Forum is now recognized in the industry as the visionary thought-leadership group it
set out to become, pointing the way forward on the security solutions that IT-dependent
organizations need and want to buy to secure their business operations in the future.
This Document
In 2006, the Jericho Forum published its commandments (design principles) for effective security
in de-perimeterized environments). This Self-Assessment Scheme takes each commandment in
Trademarks
Boundaryless Information Flow™ and TOGAF™ are trademarks and Making Standards Work®,
The Open Group®, UNIX®, and the “X” device are registered trademarks of The Open Group in
the United States and other countries.
The Open Group acknowledges that there may be other brand, company, and product names
used in this document that may be covered by trademark protection and advises the reader to
verify them independently.
Acknowledgements
The Jericho Forum gratefully acknowledges the contribution of Paul Simmonds (Founding
Member & Board Member of the Jericho Forum) as project leader, chief contributor, and editor of
this Self-Assessment Scheme. It also acknowledges the significant contributions by Andrew
Yeomans (Founding Member & Board Member) and Jamie Bodley-Scott (Member) in the
development of this document, and the contributions of other members in extensive review and
feedback during its development.
®
Jericho Forum Self-Assessment Scheme v
vi Jericho Forum 2010
1 Background and Rationale
In 2006, the Jericho Forum published its commandments 1 (with a minor revision in May 2007).
Whilst building on “good security”, these commandments specifically address those areas of
security that are necessary to achieve secure operation in environments where corporate
boundaries are increasingly being undermined – i.e., becoming de-perimeterized – with
perimeter firewalls being bypassed by VPN tunnels, wireless/mobile, etc. These commandments
have been adopted as design principles by many IT architects and designers. They continue to
serve as a set of benchmarks by which the effectiveness of information security concepts,
solutions, standards, and systems can be assessed and measured.
The Jericho Forum has known for a long time that enlightened organizations have been using
the Jericho Forum commandments as part of their Request for Procurement (RFP) processes
with vendors, and also that system and security architects use them to evaluate the
effectiveness of their security designs. The reason why is that the commandments raise those
searching issues that customers need to ask their vendors about how effectively a security
product or solution will perform in their de-perimeterizing environments, and that system
architects and designers find valuable in evaluating the security of their designs.
Over this time, the Jericho Forum has been pressed by the buy-side of our IT industry to “tell us
the searching questions we should ask our vendors so we can judge how well their products
meet our security needs”. In the April 2008 Infosecurity Europe event we did just that – we ran a
“chalk & talk” session in which we presented some of the IT security architectures you might
wish to use, explained how these operate in perimeterized environments, and then how they
could be re-designed to provide the same functionality but as if you were outside your corporate
perimeter (i.e., de-perimeterized). Effective security should work to the same effect whether you
are inside your corporate perimeter (perimeterized) or outside it (de-perimeterized).
Unsurprisingly, out of this came a set of “nasty” questions that we invited our audience to ask
their vendors so they could differentiate which competing products performed best for their
needs. Feedback from that session was so encouraging that we decided to formalize it into a set
of “searching questions to ask your vendor”, which we present in this document.
So, in this Self-Assessment Scheme, for each of our 11 commandments, we present a set of
questions which aim to bring out answers indicating how well a security product satisfies each
commandment. The answers can then be compiled into a Self-Assessment Scorecard that can
be used by vendors, customers, and system architects/designers alike:
1
Jericho Forum Commandments: published by the Jericho Forum and freely available for viewing and download from
www.opengroup.org/jericho/commandments_v1.2.pdf.
®
Jericho Forum Self-Assessment Scheme 1
• Vendors can self-assess their product and may then choose to use their Self-Assessment
Scorecard in responses to Requests for Quotation (RFQs), to indicate how “ready” their
product is.
• Customers – especially middle managers and buyers from the many small and medium
business enterprises who have not been closely involved in our development of these
commandments, and who do not have the depth of IT security expertise that larger
corporations have – can ask their vendors the “nasty” questions, and thereby make their
own assessment of how each product performs against their requirements.
• User organizations can apply the Self-Assessment Scheme to their own IT system
implementations and architectures to assess how secure they are.
• System Architects can use them to evaluate the effectiveness of the security aspects in
their designs.
Good examples always help to bring a scheme like this alive. So, for example, one of the
commandments is that you should not use inherently insecure protocols. In other words, you
should not be using telnet; instead you should use the secure version of telnet; i.e., SSH.
Similarly, you should not use FTP but instead use SFTP – which is secure. So the Jericho
Forum has said from the start “use secure protocols”. The self-assessment question here,
therefore, to score “Good” asks:
• Have you explained that if you give the option to downgrade (e.g., for a web server, out-
of-the-box it is https, but there’s an option to downgrade to the insecure version – http),
what are the pros and cons of downgrading to the less secure protocol?
We appreciate this requires additional work by the vendor, but it is so important to insist that
vendors configure their products to be secure out-of-the-box. This in itself will significantly raise
the game.
We do hope, however, that they will show that they are using the Self-Assessment Scheme and
that it helps them to raise their game, and so raise the bar towards establishing a more secure
marketplace where products are acceptably secure out-of-the-box. Product features are largely
market-driven, so if vendors actually find they are losing market share because they score low
on this (or any other credible) Self-Assessment Scheme, then that alone demonstrates its value.
Future-Proofing
After a while, we hope that most vendors will have used this Self-Assessment Scheme to
improve their products and solutions sufficiently to score well in the self-assessment. How will
customers then be able to differentiate the competing vendor products? There are two
considerations here:
• If most (and hopefully all) vendors eventually achieve near-perfect scores on the self-
assessment, then we will have succeeded in raising the security bar for the entire industry
– which is a huge win for everyone.
• Of course we know that nothing is perfect, so we expect to revisit our set of searching
questions in future, in the light of vendor and customer feedback and experience, and
revise them to optimize how well they differentiate the key features and so deliver best
value to both vendor and customer communities.
1.3 Self-Policing
As a Self-Assessment Scheme, neither the Jericho Forum nor its trademark holder The Open
Group take any responsibility for validating self-assessment scores or associated claimant
information. This scheme is entirely self-policing. It relies on the honesty of the submitters of
Self-Assessment Scorecards, in the knowledge that their reputation will be tarnished if their Self-
Assessment Scorecard is exposed as including false claims. This self-policing approach
achieves the Jericho Forum goal of promoting industry awareness and use of our
commandments while making the scheme very low-cost and low-maintenance.
A number of vendors have indicated that they welcome a tool like this because it enables them
to differentiate their product from competing products that don’t perform as well in practice. Also,
because it is a Jericho Forum scheme, and the Jericho Forum is a totally independent thought-
leader in this space, it provides the necessary degree of independence and objectivity that a
vendor-driven scheme could not achieve.
Customer feedback similarly indicates a welcome for the scheme. Not surprisingly, as buyers
they tend to be sceptical of vendor claims, so they welcome having an objective process that
enables them to verify vendor claims on specified key features.
®
Jericho Forum Self-Assessment Scheme 3
4 Jericho Forum 2010
2 Using the Self-Assessment Scheme
2.1 Caveats
• This Jericho Forum Self-Assessment Scheme is not a formal certification process. It has
no relationship or links with The Open Group certification programs.
• This scheme must not be used to represent a measure of how secure an overall
application or device is, nor should it be used to support any statement that purports to
assert that any product or solution of any kind is “fit-for-purpose”.
As a vendor or customer:
• This document is open source and royalty-free. There is no cost impact to use it in any
way you wish.
As a vendor of a product:
• You may use this document to complete the Self-Assessment Scorecard – see Section 4.
• Some commandments may not be applicable to your product, in which case the relevant
part in your Self-Assessment Scorecard should be used to indicate this.
• You may use and publish your results in any form you wish, but you must not claim or
imply that the Jericho Forum (or its trademark-holder, The Open Group) have in any way
endorsed the results.
• Should this not be available, then we recommend that you incorporate this document into
any tender or Request for Quote (RFQ) that you issue to prospective vendors. If you wish
to edit the questions or criteria in this Self-Assessment Scheme to better meet your
requirements, then you are free to do so. If you do this, however, you may not then use
®
Jericho Forum Self-Assessment Scheme 5
the term “Jericho Forum Self-Assessment” to refer to its use (except in a “derived from”
acknowledgement) or to the resulting self-assessment score(s).
• If the vendor of the product offers you a self-assessment summary, then we recommend
you compare their assessment against the complete Self-Assessment Scheme document
to ensure their summary is complete, and evaluate how far you agree with their self-
assessment results.
• Columns for “Acceptable” and “Good”, in which the criteria for scoring one or the other
against each question is described
Having completed answering all questions in all applicable self-assessment tables, and arrived
at an overall score for each commandment:
• Use the Scorecard and the detailed Self-Assessment in whichever way you find beneficial,
subject to the constraints expressed earlier in this section.
The following section presents each of the 11 Jericho Forum commandments in turn, along with a self-assessment table listing
the key requirements implicit in that commandment, and the criteria for scoring “Acceptable” or “Good” against each
requirement.
Guidance notes preceding each self-assessment table explain how to arrive at an overall score for that commandment. For any
given product, answer each requirement, assessing it as “Acceptable” or “Good”. If it achieves neither, then the score is
“Unacceptable”. As already explained, the objective is to show where and how to improve the security capabilities of products,
and initially we are not expecting vendors to score all “Good” on each commandment.
Then, enter the score for each commandment into the Self-Assessment Scorecard (see Section 4) to arrive at a summary Self-
Assessment Scorecard.
If a commandment does not apply to your product, then indicate this in the Not Applicable column of the Scorecard for that
commandment.
We encourage you to use your Self-Assessment in whichever way you find beneficial, subject to the constraints expressed in
Section 2 of this Guide.
®
Jericho Forum Self-Assessment Scheme 7
1. The scope and level of protection should be specific and appropriate to the asset at risk.
Introduction
Risk should always be considered in the context of where the application/service/solution will be used. Thus, the ultimate assessment of risk
will be in the domain of the purchaser of the product.
However, the vendor also plays a major part to ensure that all the facts are available to prospective purchasers, thus enabling a proper risk
assessment to be made.
Vendors will also see where their solutions are used and therefore should understand where successful implementations are implemented,
and more importantly where other clients have encountered problems.
Typically, a vendor should define the limits and/or risks in using their product or solution in particular environments. This may be regulatory
(or lack of compliance or approval with a particular regulatory environment) or may be due to a particular design constraint with the product.
Notes
1. “Good” is a further build on “Acceptable” – to achieve a “Good”, the criteria for “Acceptable” must be met as well.
2. (Scoring) To achieve an overall “Good”, a rating of “Good” in all areas must be achieved.
3. (Scoring) To achieve an overall rating of “Acceptable”, a rating of “Good” and/or “Acceptable” in all areas must be achieved.
®
Jericho Forum Self-Assessment Scheme 9
2. Security mechanisms must be pervasive, simple, scalable, and easy to manage.
Introduction
As a rule of thumb, security solutions that are simple tend not only to work but also be implementable. By contrast, complex solutions that
are not understood by the majority of people are bypassed, or are so complex they have loopholes in them.
Vendors should be able to provide a simple conceptual diagram describing the security model in use, where the protection is provided, and
how the solution is managed, thus enabling understanding of how a secure solution is achieved.
Management of the solution should also be described – from ensuring that systems are updated (and describing how), to explaining how
administrator access is gained (bearing in mind much maintenance will be performed remotely – refer to Jericho Forum Commandment #3),
and how user accounts are managed – bearing in mind that data and objects should be managed consistently in one place – so not
inventing its own user repository, but instead the default should be to leverage the existing repository of users (e.g., Active Directory).
Notes
1. “Good” is a further build on “Acceptable” – to achieve a “Good”, the criteria for “Acceptable” must be met as well.
2. (Scoring) To achieve an overall “Good”, a rating of “Good” in all areas must be achieved.
3. (Scoring) To achieve an overall rating of “Acceptable”, a rating of “Good” and/or “Acceptable” in all areas must be achieved.
®
Jericho Forum Self-Assessment Scheme 11
3. Assume context at your peril.
Introduction
Solutions are often designed with a particular solution, or contact in mind. It is not uncommon to find solutions being designed for a
particular client or in ignorance of what will happen when the solution is scaled to a global 24x7 environment.
Thus, a solution that requires a 4-hour downtime to close the database and backup may fail when used in a follow-the-sun model.
The aim here is to document the scope and limitations so that the end-user or prospective purchaser can make an informed choice.
However, when an organization is new to this area, often the problem is with little prior experience they have not encountered the potential
problems. Here the vendor bears a responsibility to clearly explain limitations both in design and found in practice to “bootstrap” a
prospective purchaser’s knowledge.
Note: While the normal “sales” approach is often to hide the limitations of a product, vendors can often overcome this by requesting
competing bidders to provide their competitive intelligence on the shortlisted products and solutions.
Notes
1. “Good” is a further build on “Acceptable” – to achieve a “Good”, the criteria for “Acceptable” must be met as well.
2. (Scoring) To achieve an overall “Good”, a rating of “Good” in all areas must be achieved.
3. (Scoring) To achieve an overall rating of “Acceptable”, a rating of “Good” and/or “Acceptable” in all areas must be achieved.
®
Jericho Forum Self-Assessment Scheme 13
4. Devices and applications must communicate using open, secure protocols.
Introduction
Any application or device will communicate using a set of protocols. It is therefore essential that those protocols are known, fully
documented, and appropriate. In addition, these protocols should ideally be open and secure, and should either be the only option or the
default option.
Notes
1. “Good” is a further build on “Acceptable” – to achieve a “Good”, the criteria for “Acceptable” must be met as well.
2. (Scoring) To achieve an overall “Good”, a rating of “Good” in all areas must be achieved.
3. (Scoring) To achieve an overall rating of “Acceptable”, a rating of “Good” and/or “Acceptable” in all areas must be achieved.
4. Where an application or device-specific aim is to deliver unclassified/public information to anyone who wishes to access it, then
an insecure (open) protocol may be justifiable. Examples would be a brochure-ware web server.
5. An example of a specific (and appropriate) protocol is the GSM A5/3 voice protocol, which provides secure voice
communication but is designed to maintain time integrity. Compare against voice over IPSec (designed to maintain data
integrity) and thus is an inappropriate protocol. Compare against voice over IPsec, designed to maintain data integrity but not
time integrity, so is an inappropriate protocol.
6. Documentation should typically be provided with the software and/or manual. Providing documentation on-demand or via a
support web site where the end-user would need to search out would not be acceptable to score a “Good”.
®
Jericho Forum Self-Assessment Scheme 15
5. All devices must be capable of maintaining their security policy on an un-trusted network.
Introduction
When a device is connected to a network, no assumption should be made by the application/device vendor about the state of the network.
The working assumption should be that the network is un-trusted. It is imperative that the vendor understands, designs, and then explains
how their solution works in normal use, is managed (super-user access), updated, and interacts with other typical components.
Notes
1. “Good” is a further build on “Acceptable” – to achieve a “Good”, the criteria for “Acceptable” must be met as well.
2. (Scoring) To achieve an overall “Good”, a rating of “Good” in all areas must be achieved.
3. (Scoring) To achieve an overall rating of “Acceptable”, a rating of “Good” and/or “Acceptable” in all areas must be achieved.
®
Jericho Forum Self-Assessment Scheme 17
6. All people, processes, and technology must have declared and transparent levels of trust for any transaction to take place.
Introduction
Trust needs to happen at all levels of a transaction, whether it is user to user, user to machine, or machine to machine.
For a transaction to take place it is essential that systems can communicate trust levels and the attributes associated with those trust levels.
For a vendor, they should document the trust model being used, and also those attributes that go to make up that trust, plus any
assumptions they make about devices and/or people and the attributes they can provide.
Notes
1. “Good” is a further build on “Acceptable” – to achieve a “Good”, the criteria for “Acceptable” must be met as well.
2. (Scoring) To achieve an overall “Good”, a rating of “Good” in all areas must be achieved.
3. (Scoring) To achieve an overall rating of “Acceptable”, a rating of “Good” and/or “Acceptable” in all areas must be achieved.
4. "Contract" includes agreed understandings between collaborating parties, not just legal contracts. They include electronically
brokered agreements, as defined in the Jericho Forum position paper on "Collaboration Oriented Architectures".
®
Jericho Forum Self-Assessment Scheme 19
7. Mutual trust assurance levels must be determinable.
Introduction
Trust needs to be bi-directional. For example, financial banks need to be sure it’s actually their customer who is connecting, and their
banking customers need to ensure it’s actually their bank and not a phishing site they are transacting with.
Devices need to ensure that the latest firmware is from their vendor and not a rogue update with a back-door added.
Notes
1. “Good” is a further build on “Acceptable” – to achieve a “Good”, the criteria for “Acceptable” must be met as well.
2. (Scoring) To achieve an overall “Good”, a rating of “Good” in all areas must be achieved.
3. (Scoring) To achieve an overall rating of “Acceptable”, a rating of “Good” and/or “Acceptable” in all areas must be achieved.
®
Jericho Forum Self-Assessment Scheme 21
8. Authentication, authorization, and accountability must interoperate/exchange outside of your locus/area of control.
Introduction
Often vendors provide solutions with an in-built solution for user management, authorization, and accountability.
Such management of a localized and highly defined/controlled ecosystem, while useful from a vendor point of view, is rarely ideal in the real
world, where the aim is to manage a user once and consistently.
As organizations operate outside their own boundaries, so the ability to federate that management becomes essential; otherwise,
organizations end up managing users for whom they do not manage the primary information source related to that user.
This also applies to machine authentication.
Notes
1. “Good” is a further build on “Acceptable” – to achieve a “Good”, the criteria for “Acceptable” must be met as well.
2. (Scoring) To achieve an overall “Good”, a rating of “Good” in all areas must be achieved.
3. (Scoring) To achieve an overall rating of “Acceptable”, a rating of “Good” and/or “Acceptable” in all areas must be achieved.
®
Jericho Forum Self-Assessment Scheme 23
9. Access to data should be controlled by security attributes of the data itself.
Introduction
Data, and access to that data, is (generally) what we are trying to secure. It is therefore essential that the data model for securing that data
is fully understood.
Usually a data flow diagram will aid understanding of a system, from user access, interaction with other programs (maybe through APIs),
and then storage, both on systems and on backups.
Data in all of its states should have its access controlled appropriately. This is especially necessary at the points where data transits outside
of the system under consideration and into foreign systems, or worst-case is roaming freely on the Internet.
Ideally where the data model means that data will transit outside the system, then consideration must be given to how that data will be
protected. Where access was controlled within the systems, then such access constraints should continue, either by natively protecting the
data itself, or by transferring that access information along with the data (where you trust the receiving system). When transferring data,
attributes may be negotiated to meet the receiving system's policies, with the agreement of the sending system.
Such solutions could involve Digital Rights Management (DRM) applied to the data itself; or transfer to a foreign system for which a trust
relationship exists; or transfer to a foreign device where a cryptographically secure container has been established under your control to
hold your data.
Notes
1. “Good” is a further build on “Acceptable” – to achieve a “Good”, the criteria for “Acceptable” must be met as well.
2. (Scoring) To achieve an overall “Good”, a rating of “Good” in all areas must be achieved.
3. (Scoring) To achieve an overall rating of “Acceptable”, a rating of “Good” and/or “Acceptable” in all areas must be achieved.
®
Jericho Forum Self-Assessment Scheme 25
10. Data privacy (and security of any asset of sufficiently high value) requires a segregation of duties/privileges.
Introduction
Applications or devices that handle any kind of sensitive data – personal, intellectual property, financial – should be capable of providing the
appropriate level of segregation. This segregation should ideally be capable of more than just binary control (Joe is a user, John is an
admin, or Jim does a particular role). In a de-perimeterized world, where the levels of trust are key to decision-making, the device and
application should be able to utilize this trust information to allow/modify the access being granted.
Notes
1. “Good” is a further build on “Acceptable” – to achieve a “Good”, the criteria for “Acceptable” must be met as well.
2. (Scoring) To achieve an overall “Good”, a rating of “Good” in all areas must be achieved.
3. (Scoring) To achieve an overall rating of “Acceptable”, a rating of “Good” and/or “Acceptable” in all areas must be achieved.
®
Jericho Forum Self-Assessment Scheme 27
11. By default, data must be appropriately secured when stored, in transit, and in use.
Introduction
Data needs to be secure for a number of reasons – from providing the integrity of that data, to ensuring that it is properly protected from
being viewed by unauthorized persons or systems.
The use of a risk analysis should be undertaken to understand the potential risks the data may be subject to, and then appropriate
measures implemented.
Providers of devices and systems should understand the worst-case requirements their product will be used for and provide.
Notes
1. “Good” is a further build on “Acceptable” – to achieve a “Good”, the criteria for “Acceptable” must be met as well.
2. (Scoring) To achieve an overall “Good”, a rating of “Good” in all areas must be achieved.
3. (Scoring) To achieve an overall rating of “Acceptable”, a rating of “Good” and/or “Acceptable” in all areas must be achieved.
®
Jericho Forum Self-Assessment Scheme 29
30 Jericho Forum 2010
4 Self-Assessment Scorecard
Having completed answering all the self-assessment questions for all the applicable commandments, and arrived at an overall
score for each commandment:
• Add any relevant Notes or Observations you wish to make to clarify your answer to any specific questions in any
commandment.
• Then use the Scorecard and the detailed Self-Assessment in whichever way you find beneficial, subject to the
constraints expressed earlier in this section. In particular, we hope you will review the areas where your score is not
“Good”, with a view to taking appropriate measures to improve the security of your product such that it achieves “Good”.
®
Jericho Forum Self-Assessment Scheme 31
Jericho Forum® Self-Assessment Scorecard
Product Type(s):
Description:
Named Controllers:
Not Not
Applicable Acceptable Acceptable Good
(enter “X”) (enter “X”) (enter “X”) (enter “X”) Notes/Observations
1 Specific & appropriate to the asset at risk
2 Security, simple, scalable, & manageable
3 Assume context at your peril
4 Open & secure protocols
5 Maintain security policy on un-trusted network
6 Transparent trust
7 Mutual trust assurance levels
8 Authentication outside of locus of control
9 Access by security attributes of the data
10 Data privacy requires segregation of duties
11 Data appropriately secured
Overall self-assessment of software or device:
Commandment Notes/Observations
1 <none>
2 <none>
3 <none>
4 <none>
5 <none>
6 <none>
7 <none>
8 <none>
9 <none>
10 <none>
11 <none>
®
Jericho Forum Self-Assessment Scheme 33