ad-assurance - RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT
Chronological Thread
- From: "Rank, Mark" <>
- To: "David Walker" <>
- Cc: "" <>
- Subject: RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT
- Date: Mon, 1 Apr 2013 18:18:03 +0000
- Accept-language: en-US
- Authentication-results: sfpop-ironport01.merit.edu; dkim=neutral (message not signed) header.i=none
David:
I support dropping policy and education for the reasons you outline. I feel it would be very helpful to note something specific for AD.
<soapbox>
In my interaction with some InfoSec officers at smaller campuses, they are looking for something to point to, to give them a defensible reason to move security forward on a campus against competing priorities. While I realize we need to keep things agnostic
and use of OpenLDAP or OpenDJ as a verifier would have the same problem as AD. Given the prevalence of AD-DS as a direct verifier, my feeling is we could set up a virtuous cycle for adoption of the assurance profiles locally as "generally accepted security
practice", if we provide some positive guidance for AD-DS.
</soapbox>
Sorry for the rant... I am better now..
Mark
--------------------------------------------------
Mark Rank
Project Manager - Identity & Access Mgt UCSF Information Technology Services (ITS)
email: phn:414-331-1476
--------------------------------------------------
From: David Walker []
Sent: Monday, April 01, 2013 9:58 AM To: Rank, Mark Cc: Subject: Re: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT Eric, Mark, et al,
Some thoughts:
So, I've changed the statement on https://spaces.internet2.edu/x/zoE_Ag to say "When compliance with some requirement in the IAP depends on a Subject's behavior, and it is not practical to prevent that behavior from occurring through technical means, it is acceptable to comply through the use of a monitoring and mitigation program that detects non-compliant behavior and revokes the Subject's eligibility for affected profiles within 72 hours." What do you think? Would it help to add some more specific about AD to the discussion? I was avoiding pointing fingers, but it might help with understanding of what we're trying to do. David On Mon, 2013-04-01 at 15:31 +0000, Rank, Mark wrote: David et al.: Just word smithing a bit... Instead of... "When compliance with some requirement in the IAP depends on a Subject's behavior, and it is not practical to prevent that behavior from occurring, it is acceptable to comply through the use of policy, education, and monitoring for non-compliant behavior. The IdPO shall revoke the Subject's eligibility for affected profiles with 72 hours after detecting non-compliant behavior." how about... "When compliance with some requirement in the IAP depends on a Subject's behavior, and it is not practical to prevent that behavior from occurring, valid compensating controls may be considered. Proposed valid compensating controls would be an acceptable use policy that includes a recurring education component and a monitoring program to detect and report non-compliant behavior. The IdPO shall revoke the Subject's eligibility for affected profiles with 72 hours after detecting non-compliant behavior." Regards, Mark -------------------------------------------------- Mark Rank UCSF Information Technology Services (ITS) phn:414-331-1476 -------------------------------------------------- From: [] on behalf of David Walker [] Everyone, |
- RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, Rank, Mark, 04/01/2013
- Re: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, David Walker, 04/01/2013
- RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, Capehart,Jeffrey D, 04/01/2013
- Re: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, David Walker, 04/01/2013
- RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, Capehart,Jeffrey D, 04/01/2013
- Re: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, David Walker, 04/01/2013
- RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, Rank, Mark, 04/01/2013
- Re: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, David Walker, 04/01/2013
- RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, Capehart,Jeffrey D, 04/01/2013
- Re: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, David Walker, 04/01/2013
Archive powered by MHonArc 2.6.16.