The Open Group has announced the publication of the Open Trusted Technology Provider Standard (O-TTPS) Snapshot, a preview of what is intended to become the first standard developed by The Open Group Trusted Technology Forum (OTTF).
Geared toward global providers and acquirers of commercial off-the-shelf (COTS) information and communication technology (ICT) products, the O-TTPS is designed to provide an open standard for organizational best practices to enhance the security of the global supply chain and help assure the integrity of COTS ICT products worldwide. [Disclosure: The Open Group is a sponsor of BriefingsDirect podcasts.]
The snapshot provides an early look at the standard so providers, suppliers and integrators can begin planning how to implement the standard in their organizations, and so customers, including government acquirers, can differentiate those providers who adopt the standard’s practices.
Version 1.0 of the standard is expected to be published in late 2012. The Open Group is planning an accreditation program to help provide assurance that providers conform to the standard.
“With the increasing threats posed by cyberattacks worldwide, technology buyers at large enterprises and government agencies across the globe need assurance the products they source come from trusted technology suppliers and providers who have met set criteria for securing their supply chains,” said David Lounsbury, chief technology officer, The Open Group. “Standards such as O-TTPS will have a significant impact on how organizations procure COTS ICT products over the next few years and how business is done across the global supply chain.”
The Trusted Technology Forum was formed in late 2010 under the auspices of The Open Group to help technology companies, customers, government and supplier organizations create and promote guidelines for manufacturing, sourcing and integrating trusted, secure technology products as they move through the global supply chain.
The two risks being addressed in the snapshot are tainted and counterfeit products. Each pose significant risk to organizations because altered or non-genuine products introduce the possibility of untracked malicious behavior or poor performance. Both product risks can damage customers and suppliers resulting in failed or inferior products, revenue and brand equity loss, and disclosure of intellectual property.
Additional resources are available on line:
- For more information on the O-TTPS Snapshot or to download, visit The Open Group Bookstore click here.
- For more information on The Open Group Trusted Technology Forum, click here.
- To view a video featuring OTTF Co-Chair and Cisco’s chief security strategist for the Global Value Chain Edna Conway discussing the work of the OTTF, click here.
- To attend a Webinar on the O-TTPS Snapshot entitled “Developing Standards that Secure the Global Supply Chain, Enabling Suppliers Globally to Raise the Bar on Security and Integrity,” on March 15, 2012 at register here.
You may also be interested in:
- Enterprise architecture and enterprise transformation: Related but distinct concepts that can change the world
- Open Group Conference Speakers Discuss the Cloud: Higher Risk or Better Security?
- Capgemini’s CTO on Why Cloud Computing Exposes the Duality Between IT and Business
- San Francisco Conference observations: Enterprise transformation, enterprise architecture, SOA and a splash of cloud computing
- MIT’s Ross on how enterprise architecture and IT more than ever lead to business transformation
- Overlapping criminal and state threats pose growing cyber security threat to global Internet commerce, says Open Group speaker
- Enterprise architects play key role in transformation, data analytics value — but they need to act fast, say Open Group speakers