Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera



Similar documents
The Next Generation of Security Leaders

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Domain 1 The Process of Auditing Information Systems

Open Group SOA Governance. San Diego 2009

Information security controls. Briefing for clients on Experian information security controls

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

The Need for Service Catalog Design in Cloud Services Development

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Big Data Analytics Service Definition G-Cloud 7

Supplier Security Assessment Questionnaire

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Information Security Risk Management

Enterprise Security Architecture Concepts and Practice

Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Release: 1. ICA60308 Advanced Diploma of Information Technology (E-Security)

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

Security Controls What Works. Southside Virginia Community College: Security Awareness

IBM EXAM QUESTIONS & ANSWERS

State of Oregon. State of Oregon 1

On Premise Vs Cloud: Selection Approach & Implementation Strategies

An Evaluation Framework for Selecting an Enterprise Cloud Provider

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Security Transcends Technology

Cloud-Testing vs. Testing a Cloud

Chapter 1 The Principles of Auditing 1

Roles within ITIL V3. Contents

Network Services Internet VPN

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013

Information Blue Valley Schools FEBRUARY 2015

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Cybersecurity and internal audit. August 15, 2014

Adopting Cloud Computing with a RISK Mitigation Strategy

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

G-Cloud IV Services Service Definition Accenture Cloud Security Services

Cloud Computing Thunder and Lightning on Your Horizon?

Sytorus Information Security Assessment Overview

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Symantec Consulting Services

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives

Cloud Computing An Auditor s Perspective

Cloud Courses Description

Transformational Benefits of the Cloud. Information & Communication technology October 2013

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

Cloud Security Introduction and Overview

Business Continuity Management Emerging Trends

05.0 Application Development

Cybersecurity The role of Internal Audit

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

Cloud Courses Description

Security Architecture Principles A Brief Introduction. Mark Battersby , Oslo

Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance

ISSECO Syllabus Public Version v1.0

Cloud Security Who do you trust?

Digi Device Cloud: Security You Can Trust

Privacy & Security Requirements: from EHRs to PHRs

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Infrastructure Engineer

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

G-Cloud III Services Service Definition Accenture Cloud Security Services

L Impatto della SOA sulle competenze e l organizzazione ICT di Fornitori e Clienti

Information Security Management Systems

Cloud Computing Security Considerations

UIIPA - Security Risk Management. June 2015

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Service Definition Document

Domain 5 Information Security Governance and Risk Management

Information & Asset Protection with SIEM and DLP

Dispelling the Myths about Cloud Computing Security

Information and Communication Technology

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

SECURITY RISK MANAGEMENT

Cisco Advanced Services for Network Security

KEY TRENDS AND DRIVERS OF SECURITY

JOB DESCRIPTION CONTRACTUAL POSITION

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

The Evolution of Application Monitoring

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright Security Compass. 1

IT Audit and Compliance

Application Security Architecture: Timing & Requirements Getting It Right and On Time

Transcription:

Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

About TeliaSonera TeliaSonera provides network access and telecommunication services that help our customers communicate in an easy, efficient and environmentally friendly way. International strength combined with local excellence is what makes us truly unique and provides a world class customer experience, all the way from the Nordic countries to Nepal. 190.6 million subscriptions Top 2 global IP backbone directly connecting 345 million end-users. 80% of top content providers. Our network reaches 62 countries with 200 points of presence across Europe, North America and Asia 26 013 employees at year-end 2013

Kaapro Kanto Certified Security Architect SABSA, IAF, Togaf9, CISSP, CSSLP, CISA, CCSK TeliaSonera Chief Architect, Security and Privacy Leading Security Architects in technology domains and countries Translating business strategy to technology and security strategy and programs Enabling architects across to company to design and implement security and privacy KPMG Head of Enterprise Architecture Business Line Leading a team of Security and Enterprise architects in various assignments in government, media and finance sectors Specialising in ICT transformations, corporate transactions and security architectures (design and audit). Capgemini Security and Solution Architect Chief Security Architect for outsourcing services and security manager for application services Architecting banking, micro payment, global identity management and government eservice solutions TeliaSonera Senior Security Specialist in CSIRT/SOC System Manager in Broadband Business Area

Information Security Architecture Theory Enterprise View Operational View

Defining Security Architecture The use of the term security architecture is often applied within the information security community (eg by standards bodies, information security groups and vendors) for a variety of purposes, which include: describing the security structure and components of operating systems (eg Common Data Security Architecture (CDSA) and ISO7498-2) explaining the security features of applications and security protocols (eg Java Security Architecture and RFC 4301 (IPSec)) highlighting the security specifications of business or IT infrastructure applications (eg Cisco SAFE Blueprint) promoting the functionality and interoperability of security products (eg Symantec SESA and Checkpoint NGX).

Security Architecture definition Information Security Forums

Security Architecture in practice In practice, security architecture involves more than just producing a set of representations that relate to an environment. Security architecture can be supportive of, and influenced by various elements of the information security function, including: security governance (eg security strategy, security principles, security policy, security standards / procedures) information risk analysis (eg business impact assessments, threat and vulnerability assessments and control selection) security operations (eg asset management, information and security classification, and change management) information security-related projects (eg systems development, application security and systems configuration) other aspects of security (eg physical security and business continuity).

Security Architecture Process

Security Architecture Content Framework Cloud Security Alliance

Application Security Architecture Business Requirements Business Model Data Essentials End Users Partners Administrators Regulations Security Program Requirements Operations Change Management Software Development Corporate Application Requirements Environment Data Processing Access Application Monitoring Application Design Infrastructure Requirements Network Systems Infrastructure Monitoring Virtualization and Externalization

Security in Software Architecture Maturity Model view

Areas of Maturity Model Governance is centered on the processes and activities related to how an organization manages overall software development activities. More specifically, this includes concerns that cross-cut groups involved in development as well as business processes that are established at the organization level Construction concerns the processes and activities related to how an organization defines goals and creates software within development projects. In general, this will include product management, requirements gathering, high-level architecture specification, detailed design, and implementation. Verification is focused on the processes and activities related to how an organization checks and tests artifacts produced throughout software development. This typically includes quality assurance work such as testing, but it can also include other review and evaluation activities Deployment entails the processes and activities related to how an organization manages release of software that has been created. This can involve shipping products to end users, deploying products to internal or external hosts, and normal operations of software in the runtime environment

Threat assessment / modeling The Threat Assessment (TA) Practice is centered on identification and understanding the project-level risks based on the functionality of the software being developed and characteristics of the runtime environment. From details about threats and likely attacks against each project, the organization as a whole operates more effectively through better decisions about prioritization of initiatives for security. Additionally, decisions for risk acceptance are more informed, therefore better aligned to the business

ENTERPRISE ARCHITECTURE VIEW

Enterprise Architecture view Vision & Mission Enterprise Context Drivers & Strategy Objectives Standards, Rules, Guidelines Business Models Principles Risks Business Architecture - Goals & Objectives - Business Model - Business Services - Business Processes - Business Roles Information System Architecture - Applications Landscape - IS Components - System Interactions - Lifecycle Information Architecture - Information Objects - Business Information Services - Information Interaction - Ownership, Usage, Classification Technical Infrastructure - Communication Services - Computing Services - Storage Services - Management Services - Generic Applications

Security & Privacy in Business Architecture Business Architecture sets the requirements for security and privacy. Legal and Regulatory requirements and industry practices Corporate Policies, Customer Promise Trust and Control Frameworks, Security Principles Identification of key processes Interaction with the customer Roles in different parts of the process End Find Buy Business Impact Analysis Business Continuity (Use vs Buy) Confidentiality / Privacy (Buy vs End) Change Delivery Risk Analysis Key risk areas and acceptable risk levels User Get Started

Information Aspect Area What information do we collect, use, store? How do we classify that information and how does it affect the way we protect it? Who can access that information, why, when? Customer? Support Services? Lawful Authorities? What is the Lifecycle of information? Where do we use it? How does it change? When do we delete it? What is the value of information? Increased Revenue Better Services Customer Trusts

Information Systems Aspect Area Business and Information views allow us to Define what type of information systems are needed Grouping based on drivers: cost, risk, Classification on Services Information flows and lifecycle Common Services Identity and Access Management Perimeter Protection Asset Management Monitoring and Automation Rules, Practices, Guidelines IT Security Policy & Requirements Process IT-System Information

Technology Infrastructure Aspect Area Technology Infrastructure creates the foundation for services Networks, Servers, Storage, Middleware, etc. Security Standards, Rules and Guidelines Network classification Hardening guides Logging & monitoring Encryption services Disaster recovery Service Levels Bronze, Silver, Gold (Cost / Availability / Security)

OPERATIONAL APPROACH

Case: Coordinate and scale your resources Security Governance Governance, Risk and Compliance Architecture Governance IT Security Coordinators Security Coordination of security related tasks during projects lifecycle Reporting to stakeholders about compliance to policies and instructions Project Team executing the implementation DP0 DP1 DP2 DP3 DP4 DP5 DP6 Security Design Review and Support Security Validations and Operations Security Architects Common security enablers Standard solutions for security Process and technology view Security Operations Center Security Audits for projects and services Continuous compliance and reporting Architecture Governance Common Solutions Cost efficiency and compliance Longterm planning Governance to track, involvement to enable

But aren t incomplete architectures risky? Build in multiple iterations and scope only small improvements for them If you run out of funding you still have done great improvements Technology People Requires spearheads who are able to market what you are doing and use incomplete work in big picture Focus on live knowledge: Document what is needed and spread the knowledge Process Make sure you have communicated strategy and report on measurable targets during the process Bare in mind your compliance requirements and work towards them trough scoping and design

Collaboration brings Efficiency Architecture and Security communities Collaboration between professionals to exchange knowledge Collaboration between professions to deepen knowledge 70 / 20 / 10 learning model People Capabilities You learn by doing with your peers You should also get some formal training Certified x y z to support both security and technology Make sure you can use externals when needed Reuse of solutions comes from people

Pointers for organizations Area Description ENABLEMENT LIVE KNOWLEDGE Train and certify your professionals to support technology and security transformation. Architect with CISA or security validator with CCNA or MCP are strong assets teaching the organization Share the knowledge between architects and security professionals in community work. Governance and documentation is important but focus is different $ COMPLIANCE COST CUSTOMER Use compliance frameworks and audit against those but remember your fellow architect can perform your project audit and find new way to solve requirement Build a business case to small improvements even after you solved something. Each of those can work as your security enabler or architecture building block and those can decrease the overall cost Ensure that customer expectations on security and privacy are met in all projects and services. Decrease complexity and create enablers for faster execution

Thank you! Kaapro Kanto +358 40 30 25 709 kaapro.kanto@teliasonera.com