Introduction to Security Architecture

Slides:



Advertisements
Similar presentations
Enterprise Architecture Rapid Assessment
Advertisements

© 2006 itSMF USA. All rights reserved. ITIL v3 – Familiar Ground, New Territory David Cannon ITSM Practice Principal - HP.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
TI BISNIS ITG using COBIT &
Company profile Intelligent Development Solutions is a Proprietary company, registered in Zambia. The firm is made up of consultants who are professionals.
Collaboration Oriented Architecture COA Position Paper An Overview Adrian Seccombe Board of Management, Jericho Forum ® CISO & Snr Enterprise Information.
ISEB Qualifications an evolving framework for the future.
Improving IT Governance Through Formal Change Management
By Collin Smith COBIT Introduction By Collin Smith
IS6112 Application Modelling and Design Introduction.
Viewpoint Consulting – Committed to your success.
Information Security Governance and Risk Chapter 2 Part 1 Pages 21 to 69.
COBIT Framework Introduction. Problems with IT? – Increasing pressure to leverage technology in business strategies – Growing complexity of IT environments.
PRINCE2™ Now and Next. Andy Murray PRINCE2 Lead Author Outperform UK Ltd.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Information Systems Controls for System Reliability -Information Security-
1 Business Continuity and Compliance Working Together Kristy Justice, AVP WaMu Card Services 08/19/2008.
AP039: Your ERP Opportunity Trent Innes – Dynamics Sales Manager Matt Sheard – Dynamics Solutions Specialist ERP.
Developing Enterprise Architecture
A NASSCOM ® Initiative Security and Quality Kamlesh Bajaj CEO, DSCI May 23, 2009 NASSCOM Quality Summit Hyderabad 1.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
The Evergreen, Background, Methodology and IT Service Management Model
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Continual Service Improvement Process
Cybersecurity nexus (CSX)
(ISC)2 SecureLondon 2009, London, United Kingdom This information is not intended, and should not be construed, as an offer to sell, or as a solicitation.
Roles and Responsibilities
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
10/20/ The ISMS Compliance in 2009 GRC-ISMS Module for ISO Certification.
Holistic Approach to Security
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
IT Controls Global Technology Auditing Guide 1.
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
COBIT®. COBIT® - Control Objectives for Information and related Technology. C OBI T was initially created by the Information Systems Audit & Control Foundation.
Enterprise Service Management (ESM) An Approach for Adopting and Adapting Best Practice Programs to Manage, Secure and Improve an Organizations Information.
E-Governance Technologies and Services MASTER'S CURRICULUM IN IT INGMAR PAPPEL.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
ITIL V3 Foundation Certification Exam Questions & Answers Sets Exin Certifications Presents.
Deborah Anthony, Hewlett Packard Greg Peat, Hewlett Packard Session 161: Frameworks Methodologies and Standards: Think “Bisquick” for determining the right.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Albanian Qualifications Framework Ejvis Gishti, NAVETQ Kiev, March
TOGAF and Information Governance Richard Jeffrey-Cook TOGAF and Information Governance Richard Jeffrey-Cook DLM Forum - Dublin.
Training Objectives Obtain knowledge of the ITIL terminology, structure and basic concepts and to comprehend the core principles of ITIL practices To.
An Approach To Developing a PMO A Case Study
SABSA Tietoturvan arkkitehtuuriviitekehys
ISO 37001: Anti-Bribery Management System Standard
EI Architecture Overview/Current Assessment/Technical Architecture
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Getting Down to Business
ITIL® v3 Qualification & Certification scheme
Forest Service Geospatial Enterprise Architecture
CIGFARO ANNUAL CONFERENCE – 11 OCTOBER 2017
Driving Digital Business with SAP Digital Business Services
IT and Project Management Best Practice Training
Microsoft SAM Managed Service Program
ISO 37001: Anti-Bribery Management System Standard
ITIL® 2011 F OUNDATION C OURSE ITIL® is a registered trade mark of AXELOS Limited.
ISO 9001:2015 Revision Explaining the Key Changes
ISO 37001: Anti-Bribery Management System Standard
Presentation to the INTOSAI Working Group on IT Audit Systems assurance and data analytics for continued audit quality and improved efficiency of audits.
Microsoft SAM Managed Service Program
ISO 37001: Anti-Bribery Management System Standard
ISO 37001: Anti-Bribery Management System Standard
Collaboration Oriented Architecture COA Position Paper An Overview
PRINCE2® Course Outline Foundation, Practitioner and Combined
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Data Governance & Management Skills and Experience
Security Policies and Implementation Issues
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

Introduction to Security Architecture Andy Wood Enterprise Security Architect andy@securingtheenterprise.com

agenda Types of Security Architecture What is Security Architecture? Why do Security Architecture? What is SABSA? What is the SABSA Framework? SABSA Models SABSA in the Real World Integration to other Frameworks Training & Certification agenda

Types of security architecture Two types of Security Architecture: Enterprise Security Architecture (ESA) Part of EA function. Development of security Models and Frameworks for business to operate under. Drives security holistically through every part of the business. Ensures security supports business strategy and objectives. Solution Security Architecture (SSA) Project / Programme Scope Capture security requirements for project/programme Ensure integration with enterprise models Types of security architecture

What is security architecture? Problem solutioning with a focus on Security Ensuring security requirements are identified and met. Ensuring controls & enablers are proportionate to risk & opportunity. Ensuring security services are managed through its lifecycle. Security Architecture is a business supporting function Must be maintained. Must evolve to changes in threat landscape and business strategy. What is security architecture?

Why do security architecture? To support the business deliver its objectives in a risk and opportunity managed way Need to understand the risks and opportunities Need to implement controls and enablers to support (1) Need to deliver service management to support (2) Prevent introduction of unknown risk. Why do security architecture?

What is SABSA? Sherwood Applied Business Security Architecture (SABSA) “Methodology for developing business-driven, risk and opportunity focused security architecture, and for delivering security solutions that traceably support the business requirements.” (SABSA) Sherwood Applied Business Security Architecture (SABSA) John Sherwood, David Lynas and Andrew Clark Started in mid-1995 following consultancy engagements No framework at the time (or since) to deliver ESA properly De facto framework used today globally in different markets and sectors including government and defence. Builds upon “missing components” from other frameworks Doesn’t re-invent – i.e. implementation isn’t in SABSA – use PRINCE2 Open Source & protected by SABSA Institute What is SABSA?

What is SABSA? SABSA Institute Formed 2012/13 to protect the framework Will ensure framework evolves and matures Will provide resource to develop and market next versions Manages the chartered architect exam What is SABSA?

Sabsa framework

SABSA Model for security architecture

Sabsa matrix

Many models available for direct use, or can be customised. These include: Attribute profiling Risk & Opportunity Model Multi-Tiered Control Strategy Assurance Framework Maturity Model Governance Model Vitality Model Domain & Trust Model Policy Model Lifecycle Model, etc… Frameworks and models

Attribute profiling Most powerful tool in SABSA To be introduced in future TOGAF version Conceptual abstraction of real business requirement. Standardised and re-usable. Provides 2-way traceability. Defines monitoring & reporting. Starting Taxonomy available Attribute profiling

Standard attribute taxonomy

Multi-tiered control strategy (MTCS) Defence in depth applies layering of controls to reduce risk are the layers providing the right type of controls? is it cost effective? does it meet BRs? Multi-Tiered Control Strategy controls architected to function Deter, Prevent, Contain, Detect, Track, Recover and Assure Provides cost effectiveness by preventing over investment Traceability of controls back to BRs Provides justification Provides assurance around controls Multi-tiered control strategy (MTCS)

MTCS Model

Mtcs enhanced

Sabsa in the real world Green Field Architecture Clean and simple Brown Field Architecture Muddy waters Unknown current state Heavy emphasis on strategy Sabsa in the real world

Integration with frameworks Flexible and adaptive framework Aligns with others such as TOGAF ITIL COBIT ISO27001 SOX PCI-DSS And any other… Integration with frameworks

Training & certification Three levels Foundation (SCF) [4,500] (knowledge of) Official foundation course + 2 multiple choice exams (96Q’s / 75%+) in 2 hours. Practitioner (SCP) [400] (able to apply) One official specialised course + 2 essay questions. Master (SCM) [8] (able to redevelop) Two official specialist courses + 10,000 word thesis. Four specialisms Security Architecture Design & Development Risk Management & Governance Business Continuity & Crisis Management Security Operations & Service Management Training & certification