The Open Group Library

Security White Papers

Set Descending Direction

1-10 of 21

Page:
  1. 1
  2. 2
  3. 3
  1. Saving Private Data:Intrusion Attack and Response Workshop (inc. Full Script)

    This document presents a record of the Intrusion Attack and Response Workshop – Saving Private Data. It contains a checklist for managers whose responsibilities include their company's Incident Response Plan (IRP). The complete script is included, annotated with the main issues raised and the lessons to be learned.
    Learn More
  2. Saving Private Data:Intrusion Attack and Response Workshop

    This document presents a record of the Intrusion Attack and Response Workshop – Saving Private Data.
    Learn More
  3. Identity Management

    This White Paper explores key concepts of identity management (trust, authentication, provisioning, authorization, and directories), places these concepts within their business, personal, and technical perspectives, and proposes a set of steps to be taken by The Open Group to serve as a change agent promoting the resolution of industry-wide impediments to interoperable identity management solutions.
    Learn More
  4. Jericho Forum® Trust and Co-operation

    This White Paper examines the issues involved in managing digital trust, and the controls that support interoperable trust management solutions in cyberspace, based on accepted business practices, and scalable to all sizes of enterprise.
    Learn More
  5. Jericho Forum® Business Rationale for De-Perimeterization, Version 2.0

    This White Paper reviews the business drivers for de-perimeterization, to explain why de-perimeterization is happening all round us now, and is inevitable. To maintain their competitiveness for secure online working with business partners, customers, suppliers, and outworkers, IT-dependent organizations need to migrate to security solutions which are effective in our de-perimeterizing world. The Jericho Form® is leading the way forward on how to architect de-perimeterized security solutions. Uk Isbn
    Learn More
  6. Jericho Forum® Commandments

    The Jericho Forum® Commandments define the design principles that must be observed when architecting systems for secure operation in de-perimeterized environments.
    Learn More
  7. Information Security Strategy, Version 1.0

    A Framework for Information-Centric Security Governance
    Learn More
  8. Jericho Forum® Cloud Cube Model

    This White Paper evaluates the different types of cloud and presents them in a Cloud Cube Model, highlighting the key characteristics in each type. It includes key questions that prospective cloud users need to ask their cloud service providers to provide adequate assurance that they are securely collaboratively enabled and compliant with applicable regulations.
    Learn More
  9. Jericho Forum® Identity Commandments

    These Jericho Forum® Identity Commandments define key design principles that need to be observed when planning an identity eco-system designed to operate on a global, de-perimeterized scale
    Learn More
  10. TOGAF® and SABSA® Integration

    How SABSA and TOGAF complement each other to create better architectures
    Learn More

Set Descending Direction

1-10 of 21

Page:
  1. 1
  2. 2
  3. 3