[Log In] []

Exploring the science and magic of Identity and Access Management
Wednesday, October 21, 2020
 

Sun Systemic Security

General
Author: Mark Dixon
Friday, December 22, 2006
4:42 am

A short time ago, I blogged about the Sun’s Security Adequacy Review process, focused on making sure that software developed and deployed for internal IT passes a rigorous review process before deployment. While further exploring that train of thought, I ran across an interesting article that addresses Sun’s philosoply for information security.

Glenn Brunette is a Sun Distinguished Engineer and Director of Security in Sun’s Global Sales and Services organization, who is “responsible for global security strategy and architecture as well as improving the quality and security of products and solutions delivered to Sun customers.”

Glenn proposes that, “security needs to be a pervasive quality that exists throughout IT — from architecture and policy, to education and awareness, to processes and technology.” To that end, he has been the leader in development and implementation of Sun Systemic Security program, “which includes architectural methodologies, design patterns, reference configurations, and recommended practices as well as products and services from both Sun and various partners.”

Not stopping here, Glenn is working on a system of Adaptive Security, “a concept whereby systems, devices, and services can automatically secure themselves based upon the environment into which they are being placed — as well as any policy or other constraints put upon them,” he explains. “Ideally, you should not have to go about securing each and every component individually. The systems, devices, and applications should be able to configure themselves and report on their current state.”

Wikipedia reports that “Information security is the protection of information from a wide range of threats in order to ensure business continuity, minimize business risk, and maximize return on investments and business opportunities” and points out that information can exist in many forms, printed, electronic, shown in films or spoken in conversation.” It is good to know that Sun takes a systemic and potentially adaptive approach to delivering information security.

Technorati Tags: ,
,

Comments Off on Sun Systemic Security . Permalink . Trackback URL
 

Comments are closed.

Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.