Open Trusted Technology Provider Standard
The Open Trusted Technology Provider™ Standard (O-TTPS) (Mitigating Maliciously Tainted and Counterfeit Products) is a standard of The Open Group that has also been approved for publication as an Information Technology standard by the International Organization for Standardization and the International Electrotechnical Commission through ISO/IEC JTC 1 and is now also known as ISO/IEC 20243:2015.[1] The standard consists of a set of guidelines, requirements, and recommendations that align with best practices for global supply chain security and the integrity of commercial off-the-shelf (COTS) information and communication technology (ICT) products.[2][3] It is currently in version 1.1.[4][5] A Chinese translation has also been published.[6]
Background
The O-TTPS was developed in response to a changing landscape and the increased sophistication of cybersecurity attacks worldwide.[7] The intent is to help providers build products with integrity and to enable their customers to have more confidence in the technology products they buy.[8] Private and public sector organizations rely largely on COTS ICT products to run their operations. These products are often produced globally, with development and manufacturing taking place at different sites in multiple countries.[9] The O-TTPS is designed to mitigate the risk of counterfeit and tainted components and to help assure product integrity and supply chain security throughout the lifecycle of the product.[10][11]
The Open Group's Trusted Technology Forum (OTTF) is a vendor-neutral international forum that uses a formal consensus based process for collaboration and decision making about the creation of standards and certification programs for information technology, including the O-TTPS.[12] In the forum, ICT providers, integrators and distributors work with organizations and governments to develop standards that specify secure engineering and manufacturing methods along with supply chain security practices.[13]
The Implementation Guide to Leveraging Open Trusted Technology Providers in the Supply Chain[14] provides mapping between The National Institute for Standards and Technology (NIST) Cybersecurity Framework[15] and related organizational practices listed in the O-TTPS. NIST referenced O-TTPS in their NIST Special Publication 800-161 "Supply Chain Risk Management Practices for Federal Information Systems and Organizations" that provides guidance to federal agencies on identifying, assessing, and mitigating ICT supply chain risks at all levels of their organizations.[16]
Purpose
The standard, developed by industry experts within the Forum, specifies organizational practices that provide assurance against maliciously tainted and counterfeit products throughout the COTS ICT product lifecycle.[17] The lifecycle described in the standard encompasses the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal.
Measurement and Certification
Organizations can be certified for their conformance to the standard through the Open Group's Trusted Technology Provider Accreditation Program.[18] Conformance to the standard is assessed by Recognized third party Assessors.[19] Once an organization has been successfully assessed as conforming to the standard then the organization is publicly listed in the Open Group's Accreditation Register.[20] The third party assessment process is governed by the Accreditation Policy and Assessment Procedures.[21]
History
The effort to build the standard began in January 2010 with a meeting organized by The Open Group and including major industry representatives and the United States Department of Defense and NASA. The Open Trusted Technology Forum was formally launched in December 2010 to develop industry standards and enhance the security of global supply chains and the integrity of COTS ICT products.[22]
The first publication of the Forum was a whitepaper describing the overall Trusted Technology Framework in 2010.[23] The whitepaper was broadly focused on overall best practices that good commercial organizations follow while building and delivering their COTS ICT products. That broad focus was narrowed during late 2010 and early 2011 to address the most prominent threats of counterfeit and maliciously tainted products resulting in the O-TTPS which focuses specifically on those threats.
The first version of O-TTPS was published in April 2013.[24] Version 1.1 of the O-TTPS standard was published in July 2014.[4] This version was approved by ISO/IEC in 2015 as ISO/IEC 20243:2015.
The O-TTPS Accreditation Program began in February 2014. IBM was the first company to achieve accreditation for conformance to the standard.[25]
The standard and accreditation program have been mentioned in testimony delivered to the US Congress regarding supply chain risk and cybersecurity.[26][27] The National Defense Authorization Act for Fiscal Year 2016 Section 888 (Standards For Procurement Of Secure Information Technology And Cyber Security Systems) requires that the United States Secretary of Defense conduct an assessment of O-TTPS or similar public, open technology standards and report to the Committees on Armed Services of the US Senate and the US House of Representatives within a year.[28]
See also
- Supply chain security
- Counterfeit electronic components
- International Organization for Standardization
- Commercial off-the-shelf
- Information and communications technology
External links
- http://csrc.nist.gov/scrm/references.html
- http://www.afcea.org/committees/cyber/documents/Supplychain.pdf
- http://www.networkworld.com/article/2196759/malware-cybercrime/defense-department-wants-secure--global-high-tech-supply-chain.html
- http://www.computerworlduk.com/news/security/3343185/the-open-group-previews-o-ttps-security-standard-for-supply-chains/
- http://www.opengroup.org/subjectareas/trusted-technology
- http://www.infoworld.com/article/2613780/supply-chain-management/supply-chain-2013--stop-playing-whack-a-mole-with-security-threats.html
- http://washingtontechnology.com/microsites/2012/sewp-2012/04-program-office-takes-leadership-role.aspx
- https://www.dhs.gov/news/2011/01/06/securing-global-supply-chain
- http://blogs.ca.com/2013/04/12/the-launch-of-the-open-trusted-technology-provider-standard/?intcmp=searchresultclick&resultnum=1
References
- ↑ "ISO/IEC 20243:2015". ISO.org. ISO.org. Retrieved 24 September 2015.
- ↑ Bartol, Nadya (23 May 2016). "Cyber supply chain security practices DNA – Filling in the puzzle using a diverse set of disciplines". Technovation. doi:10.1016/j.technovation.2014.01.005. Retrieved 23 May 2016.
- ↑ Whitman, Dave (March 2015). "Cybersecurity in Supply Chains". In LeClair, Jane; Keeley, Gregory. Cybersecurity in Our Digital Lives. Hudson Whitman Excelsior College Press. ISBN 978-0-9898451-4-4.
- 1 2 "Open Group's Publication Library". opengroup.org. The Open Group. Retrieved 22 June 2015.
- ↑ "ISO/IEC 20243:2015 - Information Technology -- Open Trusted Technology ProviderTM Standard (O-TTPS) -- Mitigating maliciously tainted and counterfeit products". ISO. Retrieved 2016-05-23.
- ↑ "Open Trusted Technology Provider Standard 1.1 (Chinese)". Open Group Publications Library. The Open Group. Retrieved 6 June 2016.
- ↑ "IT Supply Chain Security: Review of Government and Industry Efforts". US House of Representatives.
- ↑ Messmer, Ellen. "Defense Department wants secure, global high-tech supply chain". networkworld.com. IDG (International Data Group). Retrieved 30 March 2015.
- ↑ Lennon, Mike (9 March 2012). "USCC Releases Report on Chinese Capabilities for Cyber Operations and Cyber Espionage". Security Week (9 March 2012). Wired Business Media. Retrieved 25 January 2016.
- ↑ "Cybersecurity: An Examination of the Communications Supply Chain (testimony before Committee on Energy and Commerce Subcommittee on Communications and Technology U.S. House of Representatives" (PDF). Information Technology Industry Council. Retrieved 24 September 2015.
- ↑ Prince, Brian (5 March 2012). "Consortium Pushes Security Standards for Technology Supply Chain". SecurityWeek (March 5, 2012). Wired Business Media. Retrieved 25 January 2016.
- ↑ "Membership". opengroup.org.
- ↑ "Open Group Trusted Technology Forum". opengroup.org. The Open Group. Retrieved 11 May 2015.
- ↑ "Implementation Guide to Leveraging Open Trusted Technology Providers in the Supply Chain". NIST.Gov cybersecurity industry resources. The Open Group. Retrieved 24 September 2015.
- ↑ "Cybersecurity Framework". NIST.Gov. NIST.Gov. Retrieved 24 September 2015.
- ↑ Boyens, Jon (April 2015). "Supply Chain Risk Management Practices for Federal Information Systems and Organizations". National Institute of Technology and Standards. Retrieved 23 May 2016.
- ↑ "Executive Summary of The Open Group's testimony to the House Energy and Commerce Oversight and Investigations Subcommittee Hearing on IT Supply Chain Security: Review of Government and Industry Efforts" (PDF). Energycommerce.house.gov. US Congress. Retrieved 6 June 2016.
- ↑ "Open Group Accreditation Program". Open Group. Open Group. Retrieved 22 June 2015.
- ↑ "Recognized Assessor Register". opengroup.org. The Open Group. Retrieved 11 May 2015.
- ↑ "Open Group's Trusted Technology Register". The Open Group. The Open Group. Retrieved 22 June 2015.
- ↑ "Open Trusted Technology Provider™ Standard (O-TTPS) Accreditation Policy" (PDF). The Open Group. The Open Group. Retrieved 25 January 2016.
- ↑ "The Open Group Announces Formation of Trusted Technology Forum to Identify Best Practices for Securing the Global Technology Supply Chain". opengroup.org. Open Group. Retrieved 16 April 2015.
- ↑ "Open Trusted Technology Framework". opengroup.org. The Open Group. Retrieved April 13, 2015.
- ↑ "O-TTPS". opengroup.org. The Open Group. Retrieved 11 May 2015.
- ↑ "IBM Secure Engineering". ibm.com. IBM Corp. Retrieved 13 April 2015.
- ↑ "Energy and Commerce Committee, United States House of Representatives". United States House Energy and Commerce Committee. Retrieved 13 April 2015.
- ↑ "US Senate Commerce Science & Transportation". US Senate. Retrieved 13 April 2015.
- ↑ "National Defense Authorization Act for Fiscal Year 2016 (S. 1356)". GovTrack.us. Retrieved 2016-05-23.