Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009



Similar documents
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Model Driven Business Architecture. Pete Rivett CTO, Adaptive

Supplier Security Assessment Questionnaire

Improving your Data Warehouse s IQ

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Securing the Service Desk in the Cloud

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

INTRUSION DETECTION SYSTEMS and Network Security

05.0 Application Development

Certified Information Systems Auditor (CISA)

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Chapter 1 The Principles of Auditing 1

Domain 5 Information Security Governance and Risk Management

Security aspects of e-tailing. Chapter 7

Security Controls What Works. Southside Virginia Community College: Security Awareness

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

I. Introduction to Privacy: Common Principles and Approaches

(Instructor-led; 3 Days)

Altius IT Policy Collection Compliance and Standards Matrix

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

BMC s Security Strategy for ITSM in the SaaS Environment

Supplier Information Security Addendum for GE Restricted Data

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

1B1 SECURITY RESPONSIBILITY

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO / HIPAA / SOX / CobiT / FIPS 199 Compliant

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

Draft Information Technology Policy

Intel Enhanced Data Security Assessment Form

Symphony Plus Cyber security for the power and water industries

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Privacy + Security + Integrity

Fortinet Solutions for Compliance Requirements

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh

CHIS, Inc. Privacy General Guidelines

security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Certified Information Security Manager (CISM)

IBX Business Network Platform Information Security Controls Document Classification [Public]

ISO 27002:2013 Version Change Summary

HEC Security & Compliance

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Data Security Incident Response Plan. [Insert Organization Name]

Information security controls. Briefing for clients on Experian information security controls

Data Integration Using Universal Data Models and Effective Human Dynamics. Presented by Len Silverston, Universal Data Models, LLC

A Comparison of Oil and Gas Segment Cyber Security Standards

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

How To Manage Security On A Networked Computer System

Newcastle University Information Security Procedures Version 3

The Protection Mission a constant endeavor

Critical Controls for Cyber Security.

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Cybersecurity and internal audit. August 15, 2014

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

Domain 1 The Process of Auditing Information Systems

Remote Services. Managing Open Systems with Remote Services

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Building Reference Security Architecture

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

IAPP Privacy Certification

External Supplier Control Requirements

ISACA rudens konference

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

INFORMATION TECHNOLOGY SECURITY STANDARDS

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

STATE OF NEW JERSEY Security Controls Assessment Checklist

Information Blue Valley Schools FEBRUARY 2015

CompTIA Security+ (Exam SY0-410)

System Security Plan University of Texas Health Science Center School of Public Health

John Essner, CISO Office of Information Technology State of New Jersey

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

Top Ten Technology Risks Facing Colleges and Universities

Evaluate the Usability of Security Audits in Electronic Commerce

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

Microsoft s Compliance Framework for Online Services

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

GoodData Corporation Security White Paper

Network/Cyber Security

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

8070.S000 Application Security

ICANWK406A Install, configure and test network security

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Transcription:

Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009

Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in infrastructure, architecture, applications security and project management. WIP AMS Avient Managed Solutions! 7/22/2009 Page 2

Key Points Why do we need a Corporate security architecture? Enterprise Architecture Frameworks Examples of security architecture Designing and Implementing a Security Architecture How to assess the security architecture

Information Security Challenge Change in Infra-structure Value Based Management Privacy & Security Change in the Nature of Work Trust and Truth Change in Info-structure Key Performance Indicators: Revenue, Profitability, Cash flow, Value creation Changes the Nature of Risk

Business Drivers Government Regulations and Audits Sarbanes Oxley Bill C-198 PIPEDA Bill C-6 Industry Security Regulations Payment Card Industry Data Security Standards Open Web Application Security Project (OWASP) ISO 17799, ISO 27002 Business Relationships Outsourced services Supply chain integration Remote access to internal systems

Technology Drivers New Technologies and Infrastructure Purchased applications Integration of systems New information collection and storage Sensitive data and encryption Data leakage Cloud Computing Web based access to applications Third party control Malicious code Trojans, viruses Vulnerabilities in software External attack methods Cross site scripting Buffer overflows Memory parsers

Information Security Stakeholders Risk Management Trust and Safety Investment Protection Shareholders Privacy Protection Trust and Safety Safeguards Customers Health and Safety Privacy protection Trust Employees Management Information Integrity Confidentiality Intellectual Property protection Cost management Information Security Management Suppliers Network connections Service Agreements Continuity Planning Regulators Laws and Statutes Security and Privacy Compliance management

Enterprise Architecture Frameworks TOGAF Enterprise Architecture Framework Integration of security into different domains Architecture development method available Zachman Enterprise Architecture Framework Set of models to represent WHAT, HOW and WHERE Complete the design with WHO, WHEN and WHY Systematic description of business models, processes, data requirements Set of standard artifacts to foster communication and collaboration Security Architecture called SABSA Vendor Defined Architecture IBM Architecture Methods

Security Architecture Frameworks TOGAF Version 9 SABSA - Sherwood ISO 17799 security framework Agile Security Strategies ISO 13335 - security practices ISO 7498-2 NSA standards - Gold for Win2K Cisco SAFE

TOGAF and Security Security domain is pervasive across the other domains Areas of focus: Authentication Authorization Audit Assurance Availability Asset Protection Administration Risk Management

Security as part of Enterprise Architecture Integrated with Enterprise Architecture Business architecture Information architecture Application architecture Technology architecture Security architecture Security participation in project teams Creation of security analysis and design plans for each significant project

Conceptual Security Framework TEN KEY CONTROLS Security Policy Personnel Security Asset Classification and Control System Development and Maintenance Access Control Security Organization Computer and Network Management Business Continuity Planning Physical and Environmental Security Security Compliance 1. Based on British Standard 7799: Code of Practice for Information Security Management and NIST

Example of a Security Architecture Model IBM has a model for Security Architecture. This is illustrated in the following diagram. The Security Services correspond to the logical Components within the IT Architecture. As such there is a natural linkage between the two Architectures. Management A U D I T P O L I C Y M A N A G E M E N T & A L E R T M A N A G E M E N T Services Management Management Object Management Based on ISO Standard 7498-2 Services Identification & Authentication Mechanisms Entity Authentication Objects Users Groups Access Control Access Control Lists Security Labels Privileges Confidentiality Encipher Decipher Audit Logs Data Integrity Message Authentication Modification Detection Programs Encryption Keys Non Repudiation Digital Signature Passwords S Y S T E M I N T E G R I T Y

ENTERPRISE ARCHITECTURE - A FRAMEWORK TM DATA What FUNCTION How NETWORK Where PEOPLE Who When MOTIVATION Why TIME SCOPE (CONTEXTUAL) List of Things Important to the Business List of Processes the Business Performs List of Locations in which the Business Operates List of Organizations Important to the Business List of Events Significant to the Business List of Business Goals/Strat SCOPE (CONTEXTUAL) Planner ENTITY = Class of Business Thing Function = Class of Business Process Node = Major Business Location People = Major Organizations Time = Major Business Event Ends/Means=Major Bus. Goal/ Critical Success Factor Planner ENTERPRISE MODEL (CONCEPTUAL) e.g. Semantic Model e.g. Business Process Model e.g. Business Logistics System e.g. Work Flow Model e.g. Master Schedule e.g. Business Plan ENTERPRISE MODEL (CONCEPTUAL) Owner Ent = Business Entity Reln = Business Relationship Proc. = Business Process I/O = Business Resources Node = Business Location Link = Business Linkage People = Organization Unit Work = Work Product Time = Business Event Cycle = Business Cycle End = Business Objective Means = Business Strategy Owner SYSTEM MODEL (LOGICAL) e.g. Logical Data Model e.g. Application Architecture e.g. Distributed System Architecture e.g. Human Interface Architecture e.g. Processing Structure e.g., Business Rule Model SYSTEM MODEL (LOGICAL) Designer Ent = Data Entity Reln = Data Relationship Proc.= Application Function I/O = User Views Node = I/S Function (Processor, Storage, etc) Link = Line Characteristics People = Role Work = Deliverable Time = System Event Cycle = Processing Cycle End = Structural Assertion Means =Action Assertion Designer TECHNOLOGY MODEL (PHYSICAL) e.g. Physical Data Model e.g. System Design e.g. Technology Architecture e.g. Presentation Architecture e.g. Control Structure e.g. Rule Design TECHNOLOGY MODEL (PHYSICAL) Builder DETAILED REPRESEN- TATIONS (OUT-OF- CONTEXT) Ent = Segment/Table/etc. Reln = Pointer/Key/etc. e.g. Data Definition Proc.= Computer Function I/O = Data Elements/Sets e.g. Program Node = Hardware/System Software Link = Line Specifications e.g. Network Architecture People = User Work = Screen Format e.g. Security Architecture Time = Execute Cycle = Component Cycle e.g. Timing Definition End = Condition Means = Action e.g. Rule Specification Builder DETAILED REPRESEN- TATIONS (OUT-OF CONTEXT) Sub- Contractor Ent = Field Reln = Address Proc.= Language Stmt I/O = Control Block Node = Addresses Link = Protocols People = Identity Work = Job Time = Interrupt Cycle = Machine Cycle End = Sub-condition Means = Step Sub- Contractor FUNCTIONING ENTERPRISE e.g. DATA e.g. FUNCTION e.g. NETWORK e.g. ORGANIZATION e.g. SCHEDULE e.g. STRATEGY FUNCTIONING ENTERPRISE John A. Zachman, Zachman International (810) 231-0531

Zachman Based Security Architecture (SABSA) Level Data (What) Function (How) Network (Where) People (Who) Time (when) Motivation (why) Deliverables Contextual Identify general nature of data (personal, confidential, financial, critical) Collection Methods Business driven information security management program Business field operations management Interfaces to trading partners Data collection and usage (Sensitivity) Stakeholders, users, external parties (Privacy, Sensitivity) Business Calendar Probability of threats occurring Importance of service (Critical?) Why are threats present? Consequences and impact Corporate Policies Charts 1, 2 and 3 of TRA High level PIA Conceptual Business Continuity Management Identify data of sensitive or personal nature (Privacy, Integrity) Identify sensitive and critical Processes and resources Risk identification Location and network protection requirements (firewalls, encryption) User authentication and authorization requirements Privacy impact Availability and recovery requirements Service Levels Identify specific assets and functions at risk Vulnerability analysis Identification of security mechanisms and components (PKI, encryption) Logical Security requirements for Personal and Critical data fields (Isolation, edits, encryption) Security requirements for sensitive processes (logging, access control) Middleware security and data transfer security requirements Access to functions and transactions Security Administration requirements Business and system impact analysis When is security enforced? Determine level of protection required for assets, functions and data (accepted risk) Chart 4 & 5 of TRA Complete PIA Select security products Physical Database security mechanisms File security Audit trails and log security Security components, objects and mechanisms Network communication security mechanisms Security interface for users and administrators Authentication mechanism Security logging, access control, security reports Backup plans Integration of security components and mechanisms Security test strategy and test plans 15

Security Building Blocks Security Policy Security Standards Security Processes SERVICES MECHANISMS OBJECTS Policy Security Standard APPLICATION COMMON DB2 SERVICES NETWORK SYSTEM Network Infrastructure Windows NTUNIX Risk Assessment Audit THE SECURITY LIFECYCLE Administration Implementation Policy A security policy outlines an organization's position on security issues. It must be endorsed and supported by Management. A good security policy can be simply stated, easily understood and in a form that can be widely communicated. Standards Security standards make specific mention of technologies, methodologies, implementation procedures and other details. It is used by the enterprise to implement the security policy. Processes Processes are created and implemented with respect to polices and standards. Part of the process is an assessment of existing process to ensure business needs are still met.

Security Architecture Foundation Deliverables Risk Management Templates and Guidelines Threat risk assessment process Privacy Management guide and forms Enterprise security architecture vision Security Architecture Design Document templates Technical security standards - Baseline Project team training program Enterprise security architecture migration plan

Security Vision Mail, FTP Internet Web Hosting Shared DMZ Internal Users Internal Zone Application Logging Highly Secure Zone LDAP Security Service Application Partner Zone Third Party Connections Partner DMZ Third Party DMZ Integration Services Application Application Role Based Authorization Application Internal Data Confidential Data Public Data Firewall VLAN Application Restricted Data Banking Services Remote Access Users Partner DMZ Remote Access DMZ Business Intelligence OLAP Restricted Zone Security Credentials LDAP Security Service File Directories System Event Logging

Risk Assessment Methods Spans across all domains and is applied in context Formal methods and deliverables must be used Should be facilitated or reviewed by security experts Industry Standards (samples) Operationally critical threat asset vulnerability evaluation (OCTAVE) NIST SP 800 Threat risk assessment guide New Zealand / Australia AZ/NZS 4360 method IRM, ALARM

Threat Risk Assessment Process Planning Scope Boundary Responsibility System and data Asset inventory Acceptable risks General Threats TRA Preparation Analysis Action Plans Identify Assets Tangible Intangible Statement of Sensitivity Threat Analysis Identify Threats Probability of Occurrence Consequence Risk Analysis Vulnerabilities Controls Assessment Accept Risk Improve Controls New Controls Manage Risk (Avoid) (Transfer)

Threat Risk Assessment Deliverables Security Plan for the system Description of the risks and environment Component placement, server functions, diagrams Data classification Description of risks and key controls to be used List of baseline security components Identify new security methods or components Security testing methods Logging and Monitoring requirements

Privacy Risks Unauthorized disclosure of data to external parties Construction of data profiles Data matching and user monitoring Unauthorized use of private data Inadequate protection and safeguards Incorrect data used for decision purposes

Privacy Impact Assessment Assessment of privacy risks during systems under development Privacy risk assessment document to be completed Identify and classify personal private data Where and how is it collected? Where is it processed? Where is it stored and with what other data? Is the data disclosed to other users or systems? Document data flow and user actions Select controls and establish processes

Security Architecture Benefits Business Alignment Risk driven selection and management of controls Participation during system development Business support and business enablement Cost Management Reusability of components and processes Efficient administration and maintenance Ease of Integration Scalability of solutions Trusted solutions

Life Cycle Risk Management Money/Risk Bus. Req. Design Development Implementation Operations Design reviews The objective is to lower the risk Audit Tests and certification Technology insertion Information Protection Center and Information Security Operations Practices and technology Information Security Operation t --1 t -..1/5 Governance t 0 Time

Security at the Systems Layer Logical Security Architecture Compliance to Policies and Standards Identity management Authorizaton services Messaging security Data encryption Audit and logging facilities Malicious code protection Application Integration Deliverables: Logical Threat Risk assessment Privacy impact assessment

Security at the Technology Layer Infrastructure Protection Network Perimeter security protection Network Segmentation Network identity management Authorization Intrusion detection Remote System Access VPN and Encryption Logging and monitoring Deliverables: Physical Threat Risk assessment Testing Methods Logging and monitoring tests

Security Strategy Technology Network protection methods Intrusion detection Logging and monitoring Channel level encryption Security Standards Security Administration Code protection Security Analysis and Management Enterprise Architecture Methods Risk Management Methods Privacy assessment methods Identity, authentication and authorization Multi-layered Security architecture Incident management Governance, Risk and Compliance processes

Security Management Maturity model Process II Security Abstraction Technology centric Process III Security Formalization Fragmented Security Policies Operations centric security testing Security Enabled Organizations Governance and Risk Management Enterprise security models and tools Integrated Security Management system Integrated Individuals artisans professionals managers Human centric Isolated Groups Fragmented Security Lack of standards Process I Security Diffusion

Developing the Corporate Security Architecture Define Security Principles and Standards Security Policies, Principles and Standards Security Vision Baseline security methods and controls Define Security Artefacts and templates Integrate with Technology and application domains Define and document Core security tools and services Identity management Logging and Monitoring Network protection (firewalls and IDS) Malicious code protection Define IT Security Governance processes Participation in Systems development and technology procurement projects Integration with Project management methods Phased approach for development of security artefacts (Risk Management Plan and security diagrams) Define Security testing requirements Assess if the security methods / tools will be sustainable Define a refresh process for the security architecture

Security Architecture Development What architecture development methods are right for you? Can the security architecture be developed as a stand alone domain? Formal ADM (Strategic) Formal templates and processes Architecture Vision and Definition Architecture Core Teams and Review Boards Architecture Foundation and reference library Guidelines (Tactical) Just in time architecture Architecture LITE Security Vision and templates

Security Architecture Development Methodology Conceptual Risk Assessment Identify Security business requirements Description of current environment and processes High level Risk Assessment of business practices, data and technology Assess applicability of government or industry regulations Refine risk assessment and include future plans Create conceptual risk report Business risks Technology risks Operational / financial risks Decide level of project involvement 40

Security Architecture Development Methodology Logical Risk Assessment Logical Security Model Development Review with project team and create logical security architecture using core components Identify new security components or methods Create logical threat risk assessment document Risk assessment of each component in system Security methods and controls to be implemented Assess data protection methods and privacy impact Review with Enterprise Architecture

Security Architecture Development Methodology Physical Security Assessment Information Security Deployment and Testing Review physical deployment diagrams Validate that security requirements are implemented Review security methods and activities System logging and monitoring User management Source Code validation Define / Execute Security test strategy and plan Security Scans Vulnerability assessments Penetration tests Disaster Recovery Test Update Enterprise Architecture documents Update governance risk and compliance processes

Assessing the Security Architecture Control Objectives for IT (COBiT) Developed by ISACA as a governance framework Plan and Organize Acquire and Implement Deliver and Support Monitor and Evaluate Includes a guide for measuring maturity Capability Maturity Model Must be tailored for the organization Applied to security functions and services

Corporate Security Architecture Assessment Step 1 - Preliminary Review of Security Architecture Review the scope of the security architecture Review target security architecture Review security policies and standards Review security principles and vision Assess security organization and staffing Identify Regulatory Compliance requirements Evaluate the Risk Assessment methods in use for projects and systems Identify and map out the Architecture governance process for security Review Risk issue management process Assess Security Design Plan templates and completed forms Review security management procedures Assess Business Continuity Plan and maintenance

Corporate Security Architecture Assessment Step 2 - Evaluate Security foundation and components Validate security plans to actual implementation Assessment of security methods, technology Security awareness and risk management training Assess how security is integrated with other architecture domains Assess Security Components Identity management Logging and Monitoring systems Network protection Encryption key management processes Malicious code protection

Corporate Security Architecture Assessment Step 3 - Assess the Technical Security Architecture Security implemented for the Technology and Application layers Vulnerability Assessment methods in use Security Scan test methods Security Reviews completed by third parties Source code reviews and testing Physical security Technical support access Backup and Recovery processes Network security

Summary and Conclusions New risks created by new technologies and business processes Regulatory compliance, including privacy is driving enhanced security requirements Increase risk of attacks from external sources Enterprise Architecture is growing in popularity Challenge to implement and maintain Security architecture is pervasive across the other domains of architecture - Business, data, technology and applications Security architecture is completed in layers Conceptual, Logical, Technical Requires a framework of risk management methods, baseline standards and governance process Comprehensive risk management plan for security, privacy and business continuity