Security Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo



Similar documents
Security Principles for Cloud and SOA

Using SOA to Enhance Notifications. Rajas Kirtane 8/11/2014

Core Banking Transformation using Oracle FLEXCUBE

HP PPM - RallyDev Integrator

Address C-level Cybersecurity issues to enable and secure Digital transformation

Cloud Computing Governance & Security. Security Risks in the Cloud

Website (Digital) & Mobile Optimisation. 10 April G-Cloud. service definitions

CA Clarity PPM - RallyDev Integrator

A Comprehensive FATCA Solution

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

Capgemini Big Data Analytics Sandbox for Financial Services

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

The Aerospace & Defence industry of tomorrow

Infrastructure As A Service (IaaS) G-Cloud VI Pricing

Transforming Your Core Banking and Lending Platform

The 2013 Supply Chain Agenda

Integrated Multi-Client Platform for Smart Meters

Service Measurement Index Framework Version 2.1

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Beat the Beast - Java Performance Problem Tracking. with you. Java One - San Francisco, , Miroslaw Bartecki

Cybersecurity Strategic Consulting

Capgemini and Pegasystems: Delivering Business Value through Partnership

Information Security Management Systems

Capgemini s Guidewire Services. Leading services and solutions to support your Guidewire initiatives

Cloud Computing & Sustainability. Virtualization, Cloud Computing & Green IT Summit. October 26, 2010

Compliance and the Cloud: What You Can and What You Can t Outsource

Security and Cloud Computing

Governance and Management of Information Security

Certification for Information System Security Professional (CISSP)

VWA Capgemini Improves B2C (Bill to Cash) Cycle

A Close-up View of Microsoft Azure Adoption

Master Data Management (MDM)

Digital Transformation and the future of QA & Testing. March 3 rd, 2016 Jérôme Cadiou

SkySight: New Capabilities to Accelerate Your Journey to the Cloud

Project, Program & Portfolio Management Help Leading Firms Deliver Value

Capgemini BPO Your Partner in Delivering Value-Adding Solutions

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Prosodie and Salesforce: Front End solution. Nicolas Aidoud and Ronan Souberbielle

IT Audit in the Cloud

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

Master Data Management (MDM)

The Next Generation of Security Leaders

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Information Security Management System for Microsoft s Cloud Infrastructure

SwA Forum March 12, 2010

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013

Professional Cloud Solutions and Service Practices

Wealth management offerings for sustainable profitability and enhanced client centricity

Cloud Computing Security Audit

Domain 5 Information Security Governance and Risk Management

Meeting the challenge of software quality and maximizing return on investment Performance driven. Quality assured.

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Somewhere Today, A Project is Failing

SECURITY RISK MANAGEMENT

Credit Management through Order-to-Cash BPO

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Cloud security architecture

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

John Essner, CISO Office of Information Technology State of New Jersey

Certified Information Security Manager (CISM)

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

Assessing Risks in the Cloud

Getting a 360 customer view with SAP Business Communications Management (BCM)

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

INFORMATION SYSTEMS. Revised: August 2013

My Experience. Serve Users in a Way that Serves the Business.

Cloud Security Introduction and Overview

Comprehensive Testing Services for Life Insurance Systems

Automotive Suppliers and Cybersecurity

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

How small and medium-sized enterprises can formulate an information security management system

EA vs ITSM. itsmf

Business Process Management in Manufacturing: From Process to Value

Capgemini Business Process Outsourcing

maximum 2 lines Ultimate flexibility and control for enterprise cloud users plus infrastructure savings of up to 40%

Digital Service Centre. Automate support and empower users.

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

ISO 27002:2013 Version Change Summary

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

our enterprise security Empowering business

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

The Art of Architecture Transformation. Copyright 2012, Oracle and/or its affiliates. All rights reserved.

IT Service Management tools - Acquisition and implementation

Streamlining the Order-to-Cash process

Transcription:

Security Architecture Principles A Brief Introduction Mark Battersby 2013-05-22, Oslo

Agenda About Me Enterprise Architecture Architecture Principles Our Philosophy Security Architecture Principles Security Architecture Principles, Cloud & SOA 2

Mark Battersby Security Architect The evolution of knowledge/architecture is toward simplicity, not complexity. Profile Significant experience of analysis and verification of business and technical requirements including security audit, compliance, analysis and test of tools. Significant experience in many roles including, security architect, security adviser and security analyst. Architected and developed business critical solutions for demanding bluechip clients Specialized within information security (identity and access management, information assurance, security standards and policies) Familiarity with information security standards, ISO 27000, COBIT, ISF Security Guidelines and Benchmarking, Security Audit, Governance, Risk and Compliance Exceptional communication and presentation skills based on a strong desire to learn and share knowledge, experience and skills with project members Qualifications MSc. Information Security, RHUL (Royal Holloway, University of London) TOGAF 9 Certified Architect Member RHUL information security group Member British Computer Society Recent Professional Experience Ericsson 2012-2013, Stockholm, Sweden Information Security and Operational Risk Manager. Security Advisor to management team Development of information security and operational risk policies, directives and controls. Implementation of information security and operational risk policies, directive and controls Delivery of risk and information security awareness programs within Ericsson Regular review and audit of information security and risk management procedures Axfood, Stockholm, Sweden Analyst, Identity and Access Management Pre-study for identity and access management in a major SAP implementation Dalkia, Stockholm, Sweden Security Architect, Identity and Access Management Hands-on support to the Oracle partner implementing an identity and access management system. TeliaSonera, Stockholm, Sweden Lead Architect, Identity and Access Management, Corporate Security Business analysis, architecture and design of an identity and access management system for corporate security

Enterprise Architecture Definition Enterprise architecture (EA) is the process of translating business vision and strategy into effective enterprise change by creating, communicating and improving the key requirements, principles and models that describe the enterprise's future state and enable its evolution 4

Architecture Principles Architecture Principles are essentially guidelines which Influence the architecture (in some way) Address long term goals and strategies Describe the agenda or priority of the business May be conflicting Change infrequently if at all Architecture Principles do not Define what needs to be done Solve a specific problem Guiding Principles are rules which Allow governance of architecture Are a way to determine and define which mechanisms shall be used when there are several conflicting requirements 5

Security Architecture Principles Mark Battersby

Our philosophy The easy way of doing things should also be the secure way of doing things Security mechanisms should be appropriate, minimal and invisible to the users Security is an aspect of everything Security choices should be based on business need, risk and Return On Security Investment Information should only be present where it is necessary. Know your asset and know your needs to minimize exposure, risk and security scope

Security Principles Security Principles define key design features of information security that should be applied when architecting a secure architecture (or framework, or infrastructure). These features must: Be defined in plain language Use terms that have clear meaning within the context being used Be technology-neutral; i.e., independent of any technologies or design implementation

Guiding Principles identify correct security mechanisms Principles shall: Provide guidelines toward the long term goals of the business Describe priorities of the business Define the rules for architecture Be stable Principles shall not: Describe the problem or topic Solve the problem 9

Security Principles in Context General Security Principles SOA Security Principles Cloud Security Principles

Information Centric Security (Jerico Forum). Stored Secure the business Secure the information carrier Secure the information In transit Used Asset assessment Information centric security A reference model for securing information in the enterprise Risk analysis Policies Jericho style security A reference model for implementing information centric security Is built upon the mobile workforce concept and an interconnected world

General Security Principles Categories include Fundamentals Trust Data Protection Management Interoperability

Security Principles - Fundamentals Policy Driven Security must be driven by policy People, Process and Technology All people, processes and technology must have declared and transparrent levels of trust for any transaction to occur Openness Information security solutions should depend on open systems mechanisms.

Security Principles - Fundamentals Security by Design Security should be designed as an integral part of the system architecture Sharing Security solutions should include management controls to accommodate sharing Defense in Depth Multiple levels of protection, especially if they use different mechanisms, should be used to provide effective defense in depth

Security Principles - Fundamentals Security is Model-driven Models are reflective of the operating environment, common models, and consistent formats for identity and trust, data, policy, applications, security information and events, and cryptographic keys. Simplicity Security mechanisms should be pervasive, simple, scalable, and easy to manage. Protection against Insider and Outsider Attacks Security measures should maintain their intended effectiveness irrespective of the source credentials of a principal claiming access to a resource.

Security Principles - Trust Trust Assurance Mutual trust levels must be determinable Weakest Link Overall security can only be as effective as the weakest link in the chain from end-to-end

Security Principles Data Protection Security Context Validate the security context for which the solution is designed Data Access Control Access to data should be controlled by security attributes of the data itself Data Protection By default, data must be appropriately secured when stored, in transit and in use

Security Principles - Management Accountability Security solutions should include collection of audit information on system operations. (See also the Accountability in Service-based Architectures principle.) Regulation/Compliance Security solutions should include mechanisms to configure and monitor systems for regulatory compliance. Privacy Security solutions should include mechanisms to implement policy on privacy.

Security Principles - Management Compartmentalization (Security Domains) Resources should be protected at separated levels appropriate to their value, confidentiality, integrity, and accountability classification. Separation of Management Services Security services for management, enforcement, and accountability should be delivered as separate functions through separate authorities. Separation of Duties Security operations should enforce separation of duties.

Security Principles - Interoperability Least Privilege A principal should have only the privileges required to carry out its specified task. Agility and Extensibility Security solutions should include agility and management mechanisms to accommodate extensibility. Consumability Security solutions should include management mechanisms to accommodate consumability.

Security Architecture Principles Other Sources ISO/IEC 27001 ISO/IEC 27001:2005: Information Technology Security Techniques Information Security Management Systems Requirements. NIST NIST Special Publication 800-14: Generally Accepted Principles & Practices for Securing Information Technology Systems; Reference http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf Joint ISF, (ISC)2, ISACA Principles for Information Security Practitioners, 2010; http://www.isaca.org/knowledge-center/standards/pages/security-principles.aspx Jerico Forum Jerico Forum Commandments, 2006 Design principles that must be observed when architecting systems for secure operation in deperimeterized environments Jerico Forum Identity, Entitlement and Access Management (IdEA) Commandments, 2011 Security principles for federated identity management

Security Architecture Principles Cloud, SOA Mark Battersby 2013-05-22, Oslo

Security Architecture Principles Cloud and SOA Weakest Link Off-line backup Policy based access to Services Data Protection Privacy Multi-tenancy Data Evacuation Intellectual Property Accountability in SOA

Security Architecture Principles - Cloud and SOA Weakest Link Adding to the Weakest Link principle, this principle has particular application to Cloud and SOA. Off-line Backup It must be possible for Cloud tenants to make a back-up of their data on another environment of their choice. Policy based access to Services Service consumption will be controlled by policy. Policies must be held externally from applications.

Security Architecture Principles - Cloud and SOA Data Protection Data protection should allow compliance with corporate or regulatory compliance standards and practices, implemented in a manner that supports the other principles for Cloud and SOA, such as policy-based access, federation, multi-tenancy, etc. Privacy Extending the Privacy principle, protection of private information must demonstrate compliance with the enterprise's requirements for such protection across all points providing each service. Multi-tenancy A Cloud Computing model must support tenant and solution isolation among multiple tenants of the Cloud.

Security Architecture Principles - Cloud and SOA Data Evacuation A user of Cloud Computing must be able to request its data be removed in its entirety from the Cloud on terminating use of the service and be assured that no data is left behind in an accessible state. Intellectual Property A Cloud Computing model must support the notion that a user s intellectual assets (capital/property) and individuals or organizations innovations are protected contractually and where possible also technically, and respected by its Cloud hosting providers and/or their associated supply chain, including residual knowledge and experience-based knowledge.

Security Architecture Principles - Cloud and SOA Accountability in SOA Security design in SOA/Cloud architectures should include collection and provision of audit information on system operations.

Questions? 28

More Information Please contact: Mark Battersby email: mark.battersby@capgemini.com 29

More Information About Capgemini With around 140,000 people in 40 countries, Capgemini is one of the world s foremost providers of consulting, technology and outsourcing services. The Group reported 2010 global revenues of EUR 8.7 billion. Together with its clients, Capgemini creates and delivers business and technology solutions that fit their needs and drive the results they want. A deeply multicultural organization, Capgemini has developed its own way of working, the Collaborative Business ExperienceTM, and draws on Rightshore, its worldwide delivery model. More information is available at www.capgemini.com Rightshore is a trademark belonging to Capgemini 30

www.se.capgemini.com The information contained in this presentation is proprietary. 2011 Capgemini. All rights reserved