ObjectSecurity

Last updated
ObjectSecurity
Company type Private
Industry Information Security
FoundedUK (2000 (2000)), California since 2009, Germany since 2017
FounderUlrich Lang, Rudolf Schreiner
Headquarters San Diego, USA and Berlin, Germany
Area served
Worldwide
Key people
Ulrich Lang (CEO, ObjectSecurity LLC)
Rudolf Schreiner (CEO ObjectSecurity OSA GmbH)
Karel Gardas (Chief Software Engineer)
Holmes Chuang (Principal Software Scientist) [1]

ObjectSecurity is an information technology company focusing on information security (model-driven security, fine-grained access control, middleware security), supply chain risk analysis, data analytics, and artificial intelligence. The company pioneered the development of model-driven security, [2] which was mostly an academic concept prior to the company's developments. The company is best known for their OpenPMF (Open Policy Management Framework) model-driven security product, [3] security policy automation product for which the company received a "Cool Vendor" award from Gartner in 2008. [4] In recent years, ObjectSecurity diversified into supply-chain risk-analysis automation for which the company was selected "Finalist" by AFWERX in 2019, [5] and vulnerability assessment & pentesting automation.[ citation needed ]

Contents

History

ObjectSecurity was founded in 2000 by information security experts, Ulrich Lang and Rudolf Schreiner. [6] At that time, Lang was a researcher at the University of Cambridge Computer Laboratory, working on "Access Policies for Middleware", and both were working as independent information security consultants. [7]

Initially, ObjectSecurity was mainly working on customer projects around middleware security, esp. CORBA, but they quickly remarked that it was not possible to author and maintain security configurations for interconnected, distributed application environments. In an attempt to solve this challenges, the team built a full OMG CORBA Security SL3 & SSLIOP open source implementation based on MICO CORBA. [8]

Security Policy Automation

To solve various challenges around implementing secure distributed systems, ObjectSecurity released OpenPMF version 1, [9] at that time one of the first Attribute Based Access Control (ABAC) products in the market. It allowed the central authoring of access rules, and the automatic enforcement across all middleware nodes using local decision/enforcement points. Thanks to the support of several EU funded research projects, ObjectSecurity found that a central ABAC approach alone was not a manageable way to implement security policies. [10] [11]

ObjectSecurity released OpenPMF version 2. It is based on a concept called model-driven security which allows the intuitive, business-centric specification of security requirements and the automatic generation of enforceable securities policies. [2] [12] OpenPMF version 2 was designed to bridge the semantic gap between the policies that users manage, and the policies that are technically implemented. At the time of the release of OpenPMF version 2, model-driven security was tied together with a model-driven development process for applications, especially for agile service oriented architecture (SOA). [12]

After years of publishing and presenting the scientific and technical approach, some analyst firms, such as Gartner took note of the scientific approach. [13] Several other awards and recognition followed. [14] [15] OpenPMF version 3 was released in 2010, supporting advanced policies, Eclipse, cloud, BPMN, [16] SOA, XACML, pub-sub/DDS, and numerous additional enforcement points. [17] ObjectSecurity also extended their model-driven security approach to include automatic compliance/accreditation analysis and evidence generation [18]

In 2009, ObjectSecurity set up an independent legal entity in California, United States to be closer to their US-based customers. [19]

In recent years, ObjectSecurity has extended OpenPMF to support automatic system detection, automated formal testing, [20] virtual reality support, API server etc., enabling security policy automation without the need to install local agents, and allowing the use of model-driven security without the need for a model-driven development. OpenPMF's support for advanced access control models including proximity-based access control, PBAC was also further extended. [21]

Products

OpenPMF 4.0

In 2017, ObjectSecurity released OpenPMF version 4.0, which includes a new browser-based user interface, cloud support, and numerous other features. [22]

Supply Chain Risk Analysis Automation

In 2019, ObjectSecurity released a beta version of a United States Navy SBIR funded [23] Supply Chain Risk Analysis Management Solution (SCRAMS), [24] which analyzes procurement information from SAP and other sources for anomalies indicating supply chain risks.

Vulnerability Assessment & Pen-Testing Automation (VAPT)

In 2019, ObjectSecurity released an alpha version of a U.S. United States Navy SBIR funded [25] VAPT automation tools, [26] which automatically analyze both IP systems/networks and embedded devices (via non-IP ports) for software vulnerabilities.

BinLens

BinLens [27] , previously known as OT.AI Platform [28] , is an Operational Technology / Industrial control system firmware security-assessment platform, aimed to detect Common Vulnerabilities and Exposures at the firmware level for many industrial devices, including PLCs, HMIs, SCADA Systems, etc.

Related Research Articles

<span class="mw-page-title-main">SANS Institute</span> American security company

The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.

Java Platform, Standard Edition is a computing platform for development and deployment of portable code for desktop and server environments. Java SE was formerly known as Java 2 Platform, Standard Edition (J2SE).

Distributed Component Object Model (DCOM) is a proprietary Microsoft technology for communication between software components on networked computers. DCOM, which originally was called "Network OLE", extends Microsoft's COM, and provides the communication substrate under Microsoft's COM+ application server infrastructure.

In computer security, mandatory access control (MAC) refers to a type of access control by which a secured environment constrains the ability of a subject or initiator to access or modify on an object or target. In the case of operating systems, the subject is a process or thread, while objects are files, directories, TCP/UDP ports, shared memory segments, or IO devices. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, the operating system kernel examines these security attributes, examines the authorization rules in place, and decides whether to grant access. A database management system, in its access control mechanism, can also apply mandatory access control; in this case, the objects are tables, views, procedures, etc.

<span class="mw-page-title-main">Business process modeling</span> Activity of representing processes of an enterprise

Business process modeling (BPM) is the action of capturing and representing processes of an enterprise, so that the current business processes may be analyzed, applied securely and consistently, improved, and automated.

rPath, Inc. was a technology company based in Raleigh, North Carolina, that developed technology to automate the process of constructing, deploying, and updating software. rPath modeled and managed components and dependencies under version control. It acted as a model-driven and version-controlled repository, as well as a software distribution hub.

Supply chain security activities aim to enhance the security of the supply chain or value chain, the transport and logistics systems for the world's cargo and to "facilitate legitimate trade". Their objective is to combine traditional practices of supply-chain management with the security requirements driven by threats such as terrorism, piracy, and theft. A healthy and robust supply chain absent from security threats requires safeguarding against disturbances at all levels such as facilities, information flow, transportation of goods, and so on. A secure supply chain is critical for organizational performance.

Objective Interface Systems, Inc. is a computer communications software and hardware company. The company's headquarters are in Herndon, Virginia, USA. OIS develops, manufactures, licenses, and supports software and hardware products that generally fit into one or more of the following markets:

Security testing is a process intended to detect flaws in the security mechanisms of an information system and as such help enable it to protect data and maintain functionality as intended. Due to the logical limitations of security testing, passing the security testing process is not an indication that no flaws exist or that the system adequately satisfies the security requirements.

Robotics middleware is middleware to be used in complex robot control software systems.

In computer security, a threat is a potential negative action or event enabled by a vulnerability that results in an unwanted impact to a computer system or application.

ETAS GmbH is a German company which designs tools for the development of embedded systems for the automotive industry and other sectors of the embedded industry. ETAS is 100% owned by Robert Bosch GmbH.

<span class="mw-page-title-main">OpenRTM-aist</span>

OpenRTM-aist is a software platform developed on the basis of the RT middleware standard. OpenRTM-aist is developed by National Institute of Advanced Industrial Science and Technology which also contributes to definition of the RT-middleware standard.

Model-driven security (MDS) means applying model-driven approaches to security.

A software supply chain is the components, libraries, tools, and processes used to develop, build, and publish a software artifact.

Infrastructure as code (IaC) is the process of managing and provisioning computer data center resources through machine-readable definition files, rather than physical hardware configuration or interactive configuration tools. The IT infrastructure managed by this process comprises both physical equipment, such as bare-metal servers, as well as virtual machines, and associated configuration resources. The definitions may be in a version control system, rather than maintaining the code through manual processes. The code in the definition files may use either scripts or declarative definitions, but IaC more often employs declarative approaches.

The NIST Cybersecurity Framework (CSF) is a set of voluntary guidelines designed to help organizations assess and improve their ability to prevent, detect, and respond to cybersecurity risks. Developed by the U.S. National Institute of Standards and Technology (NIST), the framework was initially published in 2014 for critical infrastructure sectors but has since been widely adopted across various industries, including government and private enterprises globally. The framework integrates existing standards, guidelines, and best practices to provide a structured approach to cybersecurity risk management.

Code Dx, Inc. was an American software technology company active from 2015 to 2021. The company's flagship product, Code Dx, is a vulnerability management system that combines and correlates the results generated by a wide variety of static and dynamic testing tools. In 2021, the company was acquired by Synopsys.

ISO 22300:2021, Security and resilience – Vocabulary, is an international standard developed by ISO/TC 292 Security and resilience. This document defines terms used in security and resilience standards and includes 360 terms and definitions. This edition was published in the beginning of 2021 and replaces the second edition from 2018.

Zero trust architecture (ZTA) or perimeterless security is a design and implementation strategy of IT systems. The principle is that users and devices should not be trusted by default, even if they are connected to a privileged network such as a corporate LAN and even if they were previously verified.

References

  1. "Company - ObjectSecurity" . Retrieved 11 December 2024.
  2. 1 2 Memon, Atif M., ed. (26 February 2014). Advances in Computers Volume 93. Academic Press (Elsevier). p. 113. ISBN   978-0-12-800162-2.
  3. "OpenPMF Website". Object Security.
  4. "Cool Vendors in Application Security and Authentication, 2008". Archived from the original on March 4, 2016.
  5. "AFMEP: Air Force Supply Chain Challenge Finalist & ITC 2019 expo". Object Security. 2019-11-12.
  6. "About Object Security". Object Security.
  7. Lang, Ulrich (May 2003). "Technical Report (Number 564): Access Policies for Middleware, PhD Thesis" (PDF). University of Cambridge Computer Laboratory. Retrieved 2024-03-18.
  8. Lang, Ulrich; Schreiner, Rudolf (1 February 2002). Developing Secure Distributed Systems with COBRA. Artech House Publishers. ISBN   9781580532952.
  9. Lorang, Gerald (2004). "New Coach platform improves development of distributed applications. in Primeur Magazine". www.hoise.com.[ dead link ]
  10. "AD4EU FP6 Project Website".
  11. "COACH project flyer" (PDF).
  12. 1 2 "The newsletter of LTN's Information & Communications Technologies Special Interest Group 2008, p.4 (PDF hosted by ObjectSecurity, LTN is not operating anymore )" (PDF).
  13. "ObjectSecurity Publications Website".
  14. "TeleTrusT Awards" (PDF).
  15. "University of Cambridge Computer Lab Ring Awards". 23 January 2018.
  16. "Best of Open Source Software Awards 2009 (mentions the OpenPMF 2.0 integration into the open source Intalio BPMS". 31 August 2009.
  17. "ObjectSecurity OpenPMF v3 Release" (PDF).
  18. "Rudolf Schreiner and Ulrich Lang, "Model Driven Security Accreditation (MDSA) For Agile, Interconnected IT Landscapes", WISG Conference Proceedings 2009".
  19. "ObjectSecurity in Palo Alto aims to make security automatic, Silicon Valley Business Journal, 2009".
  20. "Beta Release Of Access Control Policy Tool, retrieved 2018". 24 May 2016.
  21. "Proximity Based Access Control SBIR Award Notice, 2013".
  22. "Launch OpenPMF 4.0 Security Policy Automation and Management Platform". ObjectSecurity. Retrieved 2023-08-25.
  23. "Direct to Phase II – Supply Chain Risk Analysis Management Solution (SCRAMS), 2016".
  24. "Supply Chain Risk Analysis Management Solution (SCRAMS) website, 2019".
  25. "Red Team in a Box for Embedded and Non-IP Devices, 2018".
  26. "WhizRT - VAPTBOX website, 2019".
  27. "ObjectSecurity BitLens, 2024".
  28. "ObjectSecurity Releases BinLens 3.0 for Advanced Binary Vulnerability Analysis, 2024".