Open Trusted Technology Provider Standard Explained

The Open Trusted Technology Provider Standard (O-TTPS) (Mitigating Maliciously Tainted and Counterfeit Products) is a standard of The Open Group that has also been approved for publication as an Information Technology standard by the International Organization of Standardization and the International Electrotechnical Commission through ISO/IEC JTC 1 and is now also known as ISO/IEC 20243:2015.[1] The standard consists of a set of guidelines, requirements, and recommendations that align with best practices for global supply chain security and the integrity of commercial off-the-shelf (COTS) information and communication technology (ICT) products.[2] [3] It is currently in version 1.1.[4] [5] A Chinese translation has also been published.[6]

Background

The O-TTPS was developed in response to a changing landscape and the increased sophistication of cybersecurity attacks worldwide.[7] The intent is to help providers build products with integrity and to enable their customers to have more confidence in the technology products they buy.[8] Private and public sector organizations rely largely on COTS ICT products to run their operations. These products are often produced globally, with development and manufacturing taking place at different sites in multiple countries.[9] The O-TTPS is designed to mitigate the risk of counterfeit and tainted components and to help assure product integrity and supply chain security throughout the lifecycle of the product.[10] [11]

The Open Group's Trusted Technology Forum (OTTF) is a vendor-neutral international forum that uses a formal consensus based process for collaboration and decision making about the creation of standards and certification programs for information technology, including the O-TTPS.[12] In the forum, ICT providers, integrators and distributors work with organizations and governments to develop standards that specify secure engineering and manufacturing methods along with supply chain security practices.[13]

The Implementation Guide to Leveraging Open Trusted Technology Providers in the Supply Chain[14] provides mapping between The National Institute of Standards and Technology (NIST) Cybersecurity Framework[15] and related organizational practices listed in the O-TTPS. NIST referenced O-TTPS in their NIST Special Publication 800-161 "Supply Chain Risk Management Practices for Federal Information Systems and Organizations" that provides guidance to federal agencies on identifying, assessing, and mitigating ICT supply chain risks at all levels of their organizations.[16]

Purpose

The standard, developed by industry experts within the Forum, specifies organizational practices that provide assurance against maliciously tainted and counterfeit products throughout the COTS ICT product lifecycle.[17] The lifecycle described in the standard encompasses the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal.

Measurement and Certification

Organizations can be certified for their conformance to the standard through the Open Group's Trusted Technology Provider Accreditation Program.[18] Conformance to the standard is assessed by Recognized third party Assessors.[19] Once an organization has been successfully assessed as conforming to the standard then the organization is publicly listed in the Open Group's Accreditation Register.[20] The third party assessment process is governed by the Accreditation Policy and Assessment Procedures.[21]

History

The effort to build the standard began in January 2010 with a meeting organized by The Open Group and including major industry representatives and the United States Department of Defense and NASA. The Open Trusted Technology Forum was formally launched in December 2010 to develop industry standards and enhance the security of global supply chains and the integrity of COTS ICT products.[22]

The first publication of the Forum was a whitepaper describing the overall Trusted Technology Framework in 2010.[23] The whitepaper was broadly focused on overall best practices that good commercial organizations follow while building and delivering their COTS ICT products. That broad focus was narrowed during late 2010 and early 2011 to address the most prominent threats of counterfeit and maliciously tainted products resulting in the O-TTPS which focuses specifically on those threats.

The first version of O-TTPS was published in April 2013.[24] Version 1.1 of the O-TTPS standard was published in July 2014. This version was approved by ISO/IEC in 2015 as ISO/IEC 20243:2015.

The O-TTPS Accreditation Program began in February 2014. IBM was the first company to achieve accreditation for conformance to the standard.[25]

The standard and accreditation program have been mentioned in testimony delivered to the US Congress regarding supply chain risk and cybersecurity.[26] [27] The National Defense Authorization Act for Fiscal Year 2016 Section 888 (Standards For Procurement Of Secure Information Technology And Cyber Security Systems) requires that the United States Secretary of Defense conduct an assessment of O-TTPS or similar public, open technology standards and report to the Committees on Armed Services of the US Senate and the US House of Representatives within a year.[28]

See also

External links

Notes and References

  1. Web site: ISO/IEC 20243:2015. ISO.org. ISO.org. 24 September 2015.
  2. Bartol. Nadya. 23 May 2016. Cyber supply chain security practices DNA – Filling in the puzzle using a diverse set of disciplines. Technovation. 10.1016/j.technovation.2014.01.005. 34. 7. 354–361.
  3. Book: Whitman, Dave. Cybersecurity in Our Digital Lives. Hudson Whitman Excelsior College Press. March 2015. 978-0-9898451-4-4. LeClair. Jane. Cybersecurity in Supply Chains. Keeley. Gregory.
  4. Web site: Open Group's Publication Library. opengroup.org. The Open Group. 22 June 2015.
  5. Web site: ISO/IEC 20243:2015 - Information Technology -- Open Trusted Technology ProviderTM Standard (O-TTPS) -- Mitigating maliciously tainted and counterfeit products. ISO. 2016-05-23.
  6. Web site: Open Trusted Technology Provider Standard 1.1 (Chinese). Open Group Publications Library. The Open Group. 6 June 2016.
  7. Web site: IT Supply Chain Security: Review of Government and Industry Efforts. US House of Representatives.
  8. Web site: Messmer, Ellen. Defense Department wants secure, global high-tech supply chain. Network World. IDG (International Data Group). 30 March 2015.
  9. News: Lennon. Mike. USCC Releases Report on Chinese Capabilities for Cyber Operations and Cyber Espionage. 25 January 2016. Security Week. 9 March 2012. Wired Business Media. 9 March 2012.
  10. Web site: Cybersecurity: An Examination of the Communications Supply Chain (testimony before Committee on Energy and Commerce Subcommittee on Communications and Technology U.S. House of Representatives. Information Technology Industry Council. 24 September 2015.
  11. News: Prince. Brian. Consortium Pushes Security Standards for Technology Supply Chain. 25 January 2016. SecurityWeek. March 5, 2012. Wired Business Media. 5 March 2012.
  12. Web site: Membership. opengroup.org.
  13. Web site: Open Group Trusted Technology Forum. opengroup.org. The Open Group. 11 May 2015.
  14. Web site: Implementation Guide to Leveraging Open Trusted Technology Providers in the Supply Chain. NIST.Gov cybersecurity industry resources. The Open Group. 24 September 2015.
  15. Web site: Cybersecurity Framework. NIST.Gov. NIST.Gov. 24 September 2015.
  16. Supply Chain Risk Management Practices for Federal Information Systems and Organizations. Boyens. Jon. April 2015. National Institute of Technology and Standards. 10.6028/NIST.SP.800-161. free.
  17. Web site: Executive Summary of The Open Group's testimony to the House Energy and Commerce Oversight and Investigations Subcommittee Hearing on IT Supply Chain Security: Review of Government and Industry Efforts. Energycommerce.house.gov. US Congress. 6 June 2016.
  18. Web site: Open Group Accreditation Program. Open Group. Open Group. 22 June 2015.
  19. Web site: Recognized Assessor Register. opengroup.org. The Open Group. 11 May 2015.
  20. Web site: Open Group's Trusted Technology Register. The Open Group. The Open Group. 22 June 2015.
  21. Web site: Open Trusted Technology Provider Standard (O-TTPS) Accreditation Policy. The Open Group. The Open Group. 25 January 2016.
  22. Web site: The Open Group Announces Formation of Trusted Technology Forum to Identify Best Practices for Securing the Global Technology Supply Chain. opengroup.org. Open Group. 16 April 2015.
  23. Web site: Open Trusted Technology Framework. opengroup.org. The Open Group. April 13, 2015.
  24. Web site: O-TTPS. opengroup.org. The Open Group. 11 May 2015.
  25. Web site: IBM Secure Engineering. ibm.com. IBM Corp. 13 April 2015.
  26. Web site: Energy and Commerce Committee, United States House of Representatives. United States House Energy and Commerce Committee. 13 April 2015.
  27. Web site: US Senate Commerce Science & Transportation. US Senate. 13 April 2015.
  28. Web site: National Defense Authorization Act for Fiscal Year 2016 (S. 1356). GovTrack.us. 2016-05-23.