IF-MAP

The Interface for Metadata Access Points (IF-MAP) is an open specification for a client/server protocol developed by the Trusted Computing Group (TCG) as one of the core protocols of the Trusted Network Connect (TNC) open architecture.

IF-MAP provides a common interface between the Metadata Access Point (MAP), a database server acting as a clearinghouse for information about security events and objects, and other elements of the TNC architecture.

The IF-MAP protocol defines a publish/subscribe/search mechanism with a set of identifiers and data types.

History

The IF-MAP protocol was first published by the TCG on April 28, 2008. Originally, the IF-MAP specification was developed to support data sharing across various vendor’s devices and applications for network security.[1] The specification has also been adopted for additional use cases of data-sharing including physical security.[2]

The 2.0 version of the IF-MAP spec separated the base protocol from the metadata definitions that define how different types of information are represented. The goal in separating the base protocol from the metadata definitions within the specification was to allow the specification to be adopted across other technologies (such as cloud computing,[3] industrial control systems,[4] or smart grid) to leverage their existing data models within the MAP framework.[5]

Version 2.1 of the IF-MAP spec was published on May 7, 2012. The primary new feature of IF-MAP 2.1 is that the IF-MAP identifier space became extensible.[6]

A reference implementation is available under GPLv3 license on Google Code repository.[7]

IF-MAP adoption

IF-MAP is supported by a variety of vendors:

References

  1. "Archived copy". Archived from the original on 2011-06-13. Retrieved 2010-09-13.CS1 maint: archived copy as title (link)
  2. http://www.securitymagazine.com/Articles/Online_Exclusives/BNP_GUID_9-5-2006_A_10000000000000886666
  3. "Archived copy". Archived from the original on 2010-04-24. Retrieved 2010-09-13.CS1 maint: archived copy as title (link)
  4. http://www.automation.com/content/securing-scada-and-control-networks
  5. "Archived copy". Archived from the original on 2010-12-06. Retrieved 2010-09-13.CS1 maint: archived copy as title (link)
  6. See IF-MAP 2.1 FAQ on trustedcomputinggroup.org
  7. omapd on google code
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.