Application Security Architecture: Timing & Requirements Getting It Right and On Time



Similar documents
Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Vendor Audit Questionnaire

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Microsoft SharePoint Architectural Models

Cloud Roadmap to Success. October, 2014

Cloud Computing. Bringing the Cloud into Focus

Cybersecurity in the States 2012: Priorities, Issues and Trends

SIEM just another acronym? What is it Why Advanced Persistent Threats (APTs) Audit Objectives Audit Program

<Insert Picture Here> How to protect sensitive data, challenges & risks

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Information Security Program CHARTER

Domain 1 The Process of Auditing Information Systems

SECURITY AND RISK MANAGEMENT

Running Mission-Critical Enterprise Applications in Private and Hybrid Cloud Environments

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

Enterprise Security Architecture Concepts and Practice

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

Service Definition Document

An Evaluation Framework for Selecting an Enterprise Cloud Provider

Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone

Security Threat Risk Assessment: the final key piece of the PIA puzzle

WEB Penetration Testing

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015

Security from a customer s perspective. Halogen s approach to security

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

Cloud Computing and Data Center Consolidation

The Need for Service Catalog Design in Cloud Services Development

Enterprise Security Architecture

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Frost & Sullivan. Publisher Sample

(Instructor-led; 3 Days)

Mid-Office On-Demand. iqcx Overview. Presented by Ron Childress

HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA

Growth Through Excellence

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services

AirWatch Solution Overview

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific

KLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT

Building Reference Security Architecture

Can Cloud Database PaaS Solutions Replace In-House Systems?

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

Attachment A. Identification of Risks/Cybersecurity Governance

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Mobile Security and Management Opportunities for Telcos and Service Providers

Using Managed Services As A Software Delivery Model In Canadian Health Care

PCI Requirements Coverage Summary Table

Presentation to House Committee on Technology: HHS System Identity & Access Management

ASU Web Application Security Standard

Explore the Possibilities

Cloud Security. Are you on the train or the tracks? ISSA CISO Executive Forum April 18, Brian Grayek CISSP, CCSK, ITILv3

Ipanema Technologies: A True Synergy Between WAN Optimization and Application Performance Management

Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Third Party Security: Are your vendors compromising the security of your Agency?

Protect Everything: Networks, Applications and Cloud Services

March

Moving beyond Virtualization as you make your Cloud journey. David Angradi

IT Networking and Security

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

CLOUD 401: NAVIGATING ADVANCED TOPICS IN CLOUD COMPUTING

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

How to ensure control and security when moving to SaaS/cloud applications

Developing Business Architecture with TOGAF

(Dev + Ops) ITSM = Calamity

Anypoint Platform Cloud Security and Compliance. Whitepaper

INFORMATION SECURITY STRATEGIC PLAN

BMC s Security Strategy for ITSM in the SaaS Environment

Things You Need to Know About Cloud Backup

The Business Case for Cloud: Critical Legal, Business & Diligence Considerations

Enterprise Cloud Solutions

Data Center Consolidation in the Federal Government Looking beyond the technology

Client Requirement. Why SharePoint

VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES

IT Networking and Security

Professional Cloud Solutions and Service Practices

National Initiative for Cybersecurity Education

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

Selecting the right Cloud. Three steps for determining the most appropriate Cloud strategy

1. From the CIO Strategic Direction for Cloud Computing at Kent State Cloud Computing at Kent State University 5

Transcription:

Application Security Architecture: Timing & Requirements Getting It Right and On Time Brian V. Cummings brian.cummings@tcs.com Tata Consultancy Services Thursday, March 15, 2012 Session 10187

Why? Security is to Application Development as Truth is to a Court of Law: It is usually the last thing to come to the room, and has to be dragged in by its heels, kicking and screaming in protest! Lawyer whose name I have long forgotten 1

Often a Thorny, Unresolved Issue 2

A recent (horror) Story Query from a Project Lead: Lead: Brian, when is the best time in a development project to talk to Security? Brian (to self): OMG!!! Brian (to Lead): What are you building and how far along are you. Lead: A Procurement Web Portal for the company s vendors. We begin testing in a few weeks. Brian (to Lead): The answer is At the start of the project! The one that finally prompted this presentation 3

Another Recent Story Request from a Project Lead: Lead: Brian, we are going live with this Web Portal in three months. We need you to help us document security and disaster recovery procedures Brian: What security and disaster recovery provisions have been made? Lead: Not much, but we need the procedures! Brian (to Lead): The answer is At the start of the project! They simply don t know how much they don t know! 4

Still Another Recent Story Dismissal from a Project Lead: Security Architect to Lead: What provisions are you making for security? How can I help you? We need to make sure your security architecture is consistent with our standards. Lead to Security Architect: We believe we can implement this Web Portal with a minimum of security. You don t need to worry about it! (The above in one of the world s largest financial institutions). 5 What? Me? Worry? Really?

Outsourcing your Application Development? Quality Assessor to Project Lead: Quality Guy: Who from the client is engaged in coordinating their requirements for risk, security, compliance, and continuity? Lead to Quality Guy Umm they have not been involved. Quality Guy: Did we seek them out and they declined? Did they seek us out and we declined? Lead: Umm, no, neither. What s wrong with this picture? 6

The End Result (Just Desserts) Inadequate Security Incompatible Architecture Need to Retrofit Cost and/or Vulnerability and/or Growth Limitations 7

OK, Wiseguy What s the Answer? 8

1. Frameworks & Standards Secure App Dev Framework (SABSA) Architecture Framework (TOGAF) Site Relevant Secure App Dev Standards Foundations http://pubs.opengroup.org/architecture/togaf8-doc/arch/ http://www.sabsa-institute.org/home.aspx 9

1A. TOGAF Security Architecture Authentication & Authorization Risk Management, Assurance, Audit Asset Protection Availability Administration 10

1A1. TOGAF Security Architecture Phases Business Requirements Architecture Vision Business Architecture Information Systems Architecture Technology Architecture Opportunities & Solutions Migration Planning Implementation Governance Architecture Change Management 11

1B. SABSA Secure Application Development 12

1B1. SABSA Security Matrix 13

1C1. Site Relevant Process & Standards 14

1C2. Site Relevant Process & Standards 15

2. Security Architecture Governance Enterprise Security Architecture Architectural Review/Guidance Security Governance Thought Leadership / Direction Application Security CoE IT Risk/Compliance Management Compliance Assurance Security Assessment / Compliance Audit Process Excellence Training & Awareness 16

3. Application Security Risk Management 17

3a. Application Security Risk Management 18 Risk Tier Applicability Security Extreme Risk High Risk Moderate Risk Internet facing transactional applications, especially of a financial nature. Applications that handle financial data; privacy regulated data; intellectual property; company sensitive or restricted data. Internet facing or not. Other core business applications; non-transactional Internet facing apps Strongest identification, authentication, access control, PKI encryption vs SSL, storage encryption. Continuous vulnerability testing. Strong identity authentication, access control, SSL, storage encryption, and standard vulnerability testing. Baseline security controls Low Risk All others Baseline security controls

4. Application Project Security Architects 19

4a. A More Whimsical Diagram 20

5. Security Architect as a Consultant Do This! Not This! 21

The CISO s Challenge Balancing Protection, Compliance, Enablement, Productivity, Profitability Business Enablement Increase employee and enterprise productivity and time to market Automated Identity & Access Role-Based Access Automated monitoring and alerts Automated compliance validation Facilitate business agility CISO Value Proposition InfoRisk/Security Effectiveness Optimize Information risk and security programs Alignment with business environment and business goals and objectives Vision and strategy aligned with risk Solutions balanced across risks and investment focused on greatest risks Optimize Risk & Security Investment Balance investment to risk Increase capacity and coverage with current staff Increase quality of security management Reduce relative Security TCO 22 Achieving Secure Business Success & Profitability Few endeavors in an enterprise can enable or impair its mission to the extent as can its information risk and security program.

Summary of Better Practices for Application Security Architecture Adopt the TOGAF and SABSA frameworks Establish IT Security Architecture Governance Establish Application Risk Management Require Project Security Architects Be a Consultant, not an Enforcer 23

The End! Thank you! 24 The Minions of Despicable Me