22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

373<br />

4) Attribute processing – implementation considerations:<br />

Two approaches are considered for utilization of SAML token claims in the authorization<br />

process:<br />

• A SAML token includes only a unique identifier of an entity (e.g. user,<br />

service). In this case, utilizing the ID extracted from the token, the RP<br />

local identity store has to be queried for other identity attributes required<br />

at the authorization process,<br />

• Apart from a unique identifier of an entity, additional claims are provided<br />

in a SAML token, required to perform the authorization. The additional<br />

attributes can be provided either by the IdP, or can be derived<br />

from the identity store in the DMZ area (if the “NATO as an Alliance”<br />

scenario is in a consideration), or from the local identity store of the RP<br />

(like in the previous case).<br />

The first option would be the recommended one. However, there might be<br />

cases when the other option, requiring additional attributes in tokens, will be<br />

more appropriate. This might be the case e.g. when the authorization component<br />

in the RP domain is not able to query the identity store, or the identity store is not<br />

available in RP’s domain.<br />

H. Compliance<br />

Federation trust relationships have to be verified in order to maintain the agreed<br />

(in a federation) business scope <strong>and</strong> level of protection.<br />

The compliance aspects should be considered separately in both NATO scenarios<br />

(NATO Enterprise vs. Alliance) as the means to ensure the compliance will<br />

differ for both scenarios.<br />

Normally, for low-risk <strong>and</strong> some medium risk applications, self-assessment<br />

<strong>and</strong> certification by a domain’s internal audit function may be sufficient.<br />

For some medium-risk <strong>and</strong> all high-risk scenarios, a periodic external audit will<br />

be necessary. In the “NATO as an Alliance” scenario, the federation agreement<br />

should clearly specify the following:<br />

• roles,<br />

• responsibilities,<br />

• procedures <strong>and</strong> st<strong>and</strong>ards,<br />

• liabilities in contracts<br />

I. St<strong>and</strong>ards<br />

The wide variety of federation use cases imply a variety of st<strong>and</strong>ards <strong>and</strong><br />

specifications that can be utilized. For the architecture proposed in this document,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!