Realtime Collaboration Pattern
OpenSecurityArchitecture (OSA) distills the know-how of the security architecture community and provides readily usable patterns for your application. This is a free framework, developed and owned by the community.
Click on controls in the diagram to view details. Download SVG
When to Use
Internal and external partners must share documents and work at the same time such as collaboration on business documents such as project map, strategy plan. Other pointers: Browser based interface; Business is information owner and takes decision who gets access to which information; Strong two factor authentication by using MTAN, or token (i.e. OTP, certificates).
When NOT to Use
Unable to distribute tokens.
Typical Challenges
Real-time Collaboration on business documents is not an ad-hoc solution; there are permanent user accounts in conjunction with access to dedicated storage place. The challenge will be the user provisioning, to ensure that a user account is bounded to a contract or agreement and will be maintained according to the user life cycle process.
Threat Resistance
The residual risk that will always stay is regarding the unmanaged Client of the external partner (data leakage). This risk varies depending whether it is a client of a trusted company or a client of a private person.
The following threats should be considered:
- Files can be stored by external users which are containing malicious code
- User gets to much permission or wrong folder access
- Versioning conflict if to many users working on the document during the same time
Assumptions
It is assumed that shared information will be confidential and so the communication channel and the storage place should therefore be encrypted. There is also a high technical requirement to the availability to the document which is the working target of the real-time collaboration on documents. An other aspect is capacity of the available storage, it has to be assumed that documents are growing during the period of collaboration till the document becomes the final status. Audit trails have to be available. Simple process for user provisioning available.
Mapped Controls (19)
- AC-02 Account Management
- AC-17 Remote Access
- AC-20 Use Of External Information Systems
- AT-02 Security Awareness
- AT-03 Security Training
- AU-02 Auditable Events
- AU-06 Audit Monitoring, Analysis, And Reporting
- AU-09 Protection Of Audit Information
- CA-02 Security Assessments
- CA-03 Information System Connections
- CM-03 Configuration Change Control
- CP-09 Information System Backup
- IA-02 User Identification And Authentication
- IA-04 Identifier Management
- IR-04 Incident Handling
- IR-07 Incident Response Assistance
- RA-03 Risk Assessment
- RA-05 Vulnerability Scanning
- SI-11 Error Handling