The 4 tiers of a secure B2B framework

22.06.2010

Moving forward, many of the traditional controls used to secure B2B interactions won't be adequate as major developments challenge the current security architecture. For example, it's not uncommon to have business transaction and interactions "on the go" with the use of mobile devices and interactive media using . The dynamic nature of this content poses new threats that are specific to application and Web security.

Additionally, today's with B2B partners. It's a compelling option that businesses can't ignore due to its scale, flexibility and cost structure. But as a security professional, it's your job to recognize the security and privacy concerns.

Smart Computing will also challenge today's security architecture. With the onset of Smart Grid and Smart City projects, businesses will have complex and pervasive partner relationships, some nontraditional in nature. This advancement will require security and risk assessment and management as the connected ecosystem increases cyberthreats and data confidentiality demands.

As of yet, little thought has been given to an architecture that will address these key inflection points that are affecting B2B interactions. Forrester has devised four tiers of access control that are essential for secure future B2B interactions:

1. Application Access Control: App control will emerge at the perimeter with IAM integration. When applications and services are hosted via cloud--application access, authorization and authentication become ever more important. Identity and access management (IAM) will play an important role, as it works with entitlement management to define roles, duties and access levels to applications. Another central point to application control is identity federation. Since B2B security relies on this federation, it will be important to control access to the critical resources.