Security Architecture and Design from a Business/Enterprise Driven Viewpoint



Similar documents
SABSA A Brief Introduction

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Enterprise Security Architecture

An Analysis of The SABSA Framework. Note: Most of this information comes from the SABSA website. TJS. SABSA Overview

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013

Advanced Topics for TOGAF Integrated Management Framework

Intelligent Security Design, Development and Acquisition

Enterprise Architectures (EA) & Security

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

The Protection Mission a constant endeavor

Caretower s SIEM Managed Security Services

How To Improve Your Business

Agenda. How to configure

APIs The Next Hacker Target Or a Business and Security Opportunity?

NERC CIP VERSION 5 COMPLIANCE

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

THE BLUENOSE SECURITY FRAMEWORK

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

OPC UA vs OPC Classic

Microsoft SOA Roadmap

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

The role of integrated requirements management in software delivery.

Setting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture

A Mock RFI for a SD-WAN

The Value of Vulnerability Management*

Critical Controls for Cyber Security.

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Defending Against Data Beaches: Internal Controls for Cybersecurity

How To Achieve Pca Compliance With Redhat Enterprise Linux

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

How can Identity and Access Management help me to improve compliance and drive business performance?

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

ArchiMate and TOGAF. What is the added value?

GoodData Corporation Security White Paper

IT Security. Securing Your Business Investments

Building Reference Security Architecture

Vidder PrecisionAccess

The Unique Alternative to the Big Four. Identity and Access Management

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

Building Security into the Software Life Cycle

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010

Automating Cloud Security Control and Compliance Enforcement for PCI DSS 3.0

Aligning CMMI & ITIL. Where Am I and Which Way Do I Go? cognence, inc.

Introduction to IT Security

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Cybersecurity The role of Internal Audit

Enterprise Architecture Assessment Guide

Enterprise Security Architecture Concepts and Practice

Realizing business flexibility through integrated SOA policy management.

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Introduction to SAML

Architecture Guidelines Application Security

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

PCI Requirements Coverage Summary Table

Enterprise effectiveness of digital certificates: Are they ready for prime-time?

CMS Policy for Configuration Management

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA

Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK

Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies

Think like an MBA not a CISSP

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

Looking at the SANS 20 Critical Security Controls

Payment Card Industry Data Security Standard

Delivering value to the business with IAM

SECURITY RISK MANAGEMENT

The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

Information Security Services

05.0 Application Development

Symphony Plus Cyber security for the power and water industries

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Cybersecurity: What CFO s Need to Know

GE Measurement & Control. Cyber Security for NEI 08-09

White paper. The Big Data Security Gap: Protecting the Hadoop Cluster

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Assessing Your Information Technology Organization

Firewall Change Management

Governance and Management of Information Security

Conceptual Model for Enterprise Governance. Walter L Wilson

Transcription:

Security Architecture and Design from a Business/Enterprise Driven Viewpoint Introduction to Enterprise Security Architecture using the SABSA methodology, and design pattern examples Robert Trapp, Perry Bryden Presented at ISC2 Meeting, September 18, 2014

Agenda Introduction What s Enterprise Security Architecture and who cares Introduction to SABSA Methodology Logical Security Architecture - overview and example (Adapted from 2013 COSAC conference presentation: Security Design Patterns at Logical Architecture Level) Physical Security Architecture - overview and example (Adapted from 2013 COSAC conference presentation: Security Design Patterns at Physical Architecture Level) Presentation Wrap up Further Q&A Discussion 2

Key Takeaways for Enterprise Security Architecture Framework to manage enterprise complexity Move from 100% Firefighting to Designed-in Business/Mission Perspective Prioritized investments Moving past compliance Address gaps in the NIST approach 3

What Enterprise Security Architecture is NOT Enterprise Security Architecture is NOT: Typical Enterprise Architecture practice Security is usually a lightweight afterthought Technical Architecture (part of the picture, but not the main focus) A network diagram with Firewalls, routers & other devices, A diagram of the Active Directory design Lacks traceability to Business needs and priorities Lacks enterprise perspective, business drivers Compliance NIST, ISO, COBIT, PCI, etc. Compliance treats all assets as if they have the same value Compliance alone doesn t produce security architecture and is not sufficient to produce secure systems Product Driven Vendor point solutions leave gaps Lacks interoperability Not Vendor neutral leads to Vendor Lock-in 4

What IS ESA A holistic enterprise-wide view of security with principles, policies, models and standards for designing and building enterprise systems - with the aim of reducing risk ESA is Security Architecture from a business/enterprise viewpoint Security decisions based on business need, top down Starts with business processes not with IT products on hand or in the market Provides traceability: All security designs and technology/ products must have an explicitly traceable (i.e. auditable) path back to their business purpose (i.e. why they are used) ESA provides a framework for managing complexity of the huge array of architectural factors we need to track in a coherent way Business process, assets, organizations, strategies, market environment and risk environment Enterprise risk management based decision processes Transition from high level to low level architectures and design, to components products & configurations Methodical progression from business attributes to physical design 5

Why you should care about ESA We MUST move away from compliance-only driven thinking Compliance alone does not create effective security We have proof that it s not effective. (e.g. Target, 100s of others) Top down engagement is necessary to prioritize and fund security investments Security $$ should be tied to the business value of the asset Provides a common framework and language to enable meaningful dialogs at all levels of the organization about real security issues Without this Trust and access decisions made at a technical level are not apparent to business level but can have a business impact Changes to the nature of a business partnership requires changes to access rules but are not easily implemented by the technical team due to prior inflexible design decisions ESA is not a silver bullet solution, but it is a necessary part of the solution 6

Why you should care about ESA Provides an approach to creating meaningful metrics to measure success and progress Every level of the organization has a different focus Business execs care about managing risk to business assets They care little about the number of viruses/malware were detected or patches applied Tell them how active threats are being identified and how risks are being managed Show the layers of protection working together The Web App scanner detected a vulnerability and the WAF enforced a mitigation until the patch can be implemented Show dynamic processes for working at all layers of the organization and ESA - If an attacker gets past a layer of defense, immediately adapt the mechanism to compensate 7

Introduction to SABSA Background Sherwood Applied Business Security Architecture (SABSA) Methodology for developing business-driven, risk and opportunity focused enterprise security & information assurance architectures, and for delivering security Comprises: framework with several integrated models, methods & processes Proven method, developed and evolved from experience not theory Most well developed methodology for architecting security Uses an enterprise architecture type framework for communications across different sets of stakeholders Infrastructure solutions that traceably support critical business initiatives Business driven approach Used internationally, adopted by many government and private organizations as standard for security architecture, recently TOGAF 9 adoption Coherent with ITIL Open source: although copyright protected, SABSA is free for use. 8

Introduction to SABSA Background History: (1995) Originally authored by John Sherwood, (1995) First used in global financial messaging, (2005) SABSA Textbook, September, (2007) Adopted as UK MoD Information Assurance Standard, (2007) Certification programme introduced March, (2013) SABSA Institute UK approved to control open source IP. Can be applied flexibly: Several scopes: enterprise, individual system, component In whole or in part Seamless security integration & alignment with other frameworks (e.g. NIST, TOGAF, ITIL, ISO27000 series, Zachman, DoDAF, CobIT) Fills the gaps for security architecture and security service management left by other frameworks Comparing to NIST SABSA has an enterprise perspective, NIST is very system centric. Would integrate well into NIST 800-39 RMF 1 st & 2 nd tier 9

Introduction to SABSA The Framework SABSA comprised of: Principles and approach A series of integrated frameworks, models, methods, and processes Two foundational frameworks: Master matrix and Services matrix 2 genuinely unique aspects of SABSA approach (Our opinion) : Reframing business security goals as NOT just CIA/CIAAA The Business Attributes Profile Method for requirements management and establishing measureable security Crux of traceability SABSA covers the whole life cycle, but does not have any models or frameworks for the implementation phase, it recommends use of proven approaches like PMP, Agile, PRINCE2 10

Introduction to SABSA The Framework All architectural frameworks manage complexity using multilayered views and each of the layers uses various models Security Does not exist in a vacuum Architecture View Cuts across all other views Security is an emergent property. Has: Functional aspects & quality/ non-functional aspects 11

Introduction to SABSA The Framework (Master matrix) Stakeholders: Bus Execs Architects Architects & Engineers Builders & Engineers Tech. Specialists Operations Managers 12

Introduction to SABSA Service Management Matrix 13

<-- Manage --> & Measure <-------------------------- Design ----------------------> <-------- Strategy & Planning -------> Introduction to SABSA Bob s Annotated Master Matrix Life Cycle Stage Layer (Role View) CONTEXTUAL ARCHITECURE (Business) CONCEPTUAL ARCHITECTURE (Architect, Strategist) Architecure Issues & Interogatives Bob's Annotated SABSA Master Matrix(v02) ASSETS (What) MOTIVATION (Why) PROCESS (How) PEOPLE (Who) LOCATION (Where) TIME (When) Business Decisions Business Risk Business Processes Business Governance Business Geography Business Time Dependence Taxonomy of Business Opportunities & Threats Inventory of Operational Organisational Structure Inventory of Buildings, Time dependencies of Assets, including Goals & Inventory Processes & the Extended Sites, Territories, business objectives Objectives Enterprise Jurisdictions, etc. Business Knowledge & Risk Management Strategies for Process Roles & Domain Framework Time Management Risk Strategy Objectives Assurance Responsibilities Framework Business Attributes Profile Enablement & Control Objectives; Policy Architecture Process Mapping Framework; Architectural Strategies for ICT Owners, Custodians and Users; Service Providers & Customers Security Domain Concepts & Framework Through-Life Risk Management Framework LOGICAL ARCHITECTURE (Designer, Engineer) PHYSICAL ARCHITECTURE (Builder, Proj Mgr) COMPONENT ARCHITECTURE Information Assets Risk Management Policies Process Maps & Services Inventory of Information Domain Policies Assets Data Assets Data Dictionary & Data Inventory ICT Components Risk Management Practices Risk Management Rules & Procedures Risk Management Tools & Standards Information Flows; Functional Transformations; Service Oriented Architecture Entity & Trust Framework Entity Schema; Trust Models; Privilege Profiles Domain Maps Domain Definitions; Interdomain associations & interactions Calendar & Timetable Start Times, Lifetimes & Deadlines Process Mechanisms Human Interface ICT Infrastructure Processing Schedule Applications; Middleware; Systems; Security Mechanisms Process Tools & Standards User Interface to ICT Systems; Access Control Systems Personnel Man ment Tools & Standards Host Platforms, Layout & Networks Locator Tools & Standards Timing & Sequencing of Processes and Sessions Step Timing & Sequencing Tools Implement Which standards apply where in the matrix (Tradesman, Engineer) SERVICE MANAGEMENT ARCHITECTURE (Service Management) ICT Products, including Data Repositories and Processors Service Delivery Management Assurance of Operational Continuity & Excellence Risk Analysis Tools; Risk Registers; Risk Monitoring and Reporting Tools Operational Risk Management Risk Assessment; Risk Monitoring & Reporting; Risk Treatment Tools and Protocols for Process Delivery Process Delivery Management Management & Support of Systems, Applications & Services Identities; Job Descriptions; Roles; Functions; Actions & Access Control Lists Personnel Management Account Provisioning; User Support Management Nodes, Addresses and other Locators Management of Environment Management of Buildings, Sites, Platforms & Networks Time Schedules; Clocks, Timers & Interrupts Time & Performance Management Management of Calendar and Timetable Standards: Why column: Laws & Regs, 800-30, ITIL, ISO 27005, Basel II, COSO, OGC MoR Color Legend: Assets at Risk Control Obj's & Targets Risk Mgt Obj/Yellow cell: ISO 27001, COBIT, ISF CoP Business Risk Oper Risk Mgt Processes How column: QA/QC, TQM, Process Engr. Factors Effecting Risk Controls Who column: Governance frameworks When column: Performance, CMMI, Bal. Scorecard, Financial measures (ROI ) All white/control cells: ISO 27002, 800-54, SOX, PCI-DSS, HIPAA, Cobit Green - Assets Red Bus. Risk Blue Factors effecting risk Yellow Control objectives & targets Orange Op risk process White - Controls 14

Introduction to SABSA The Suite of Framework Tools The SABSA framework contains many more models and methods: The SABSA Master Architecture Matrix: SABSA Artifacts The SABSA Service Management Matrix: SABSA Processes Business Requirements Engineering Framework (e.g. Business Attributes Profiling) Lifecycle Model and Process Risk and Opportunity Model and Risk Management Process Multi-tiered control strategy model Policy Architecture Framework Governance Model and Process Security Domain Framework Security Services-Oriented Architecture Framework Maturity Profile Vitality Model Through-life Security Service Management & Performance Management Framework 15

Introduction to SABSA Sampling of Framework Tools Business Attributes Profile Mutli-Tiered Control Strategy Model Risk & Opportunity Model 16

Security at the Logical Architecture Level - Purpose Purpose of this section: Describe logical security architecture & its value Relation of logical architecture to other aspects of enterprise architecture Not enough work is done at this level Material based on a presentation given at Oct 2013 COSAC Security Conference 17

Security at the Logical Architecture Level - Challenge What is Logical architecture What do you mean LOGICAL layer, of course our systems are logical! Are the servers built yet? Accounting needs a cost & bill of materials before you start! For many in business, IT and security: don t understand, question value, are frustrated Have you started coding yet? Can we at least see a network diagram, you know, something tangible? Is this going to take very long? That s not how our LDAP works! Perception problem it s not tangible But LA is where we do critical systems thinking 18

Logical Security Architecture Focus & Value LA is: Conceptual systems engineering approach to architecture - a.k.a. solution arch, high level arch - SABSA content guidance Functional specifications - Component & Process maps Security aspect data models/erd - Security boundaries/domain models Abstract Trust & Permissions models - Security policies Map of security services vs. controls - Performance metrics Logical architecture process - critical systems thinking and decisions Last place to declare, in depth, your technical vision and needs prior to being obsessed by vendor products & implementation issues Think about fundamental design flaws (vs. bugs), attacks and mitigation (Example: does this data require authentication for access, and if so how good/ how much?) Define security protection objectives in terms of services, assurance levels, qualities needed from business purpose perspective Overlay and integrate with the rest of the (non-security) architecture 19

Logical Security Architecture Where does it fit in ESA Logical security architecture Is a design that is driven by the requirements of layer above (conceptual architecture) Provides guidance to the next layer (physical architecture) Traceability up and down CONCEPTUAL ARCHITECTURE (Architect, Strategist) LOGICAL ARCHITECTURE Business Knowledge & Risk Strategy Fulfills Information Assets Risk Management Objectives Informs Risk Management Policies Strategies for Process Assurance Process Maps & Services Roles & Responsibilities Entity & Trust Framework Domain Framework Domain Maps Time Management Framework Calendar & Timetable (Designer, Engineer) PHYSICAL ARCHITECTURE (Builder, Proj Mgr) * Inventory of Information Assets Data Assets * Domain Policies Risk Management Practices * Information Flows * Functional Transformations * Service Oriented Architecture Process Mechanisms * Entity Schema * Trust Models * Privilege Profiles Informs Human Interface * Domain Definitions * Inter-domain associations & interactions ICT Infrastructure * Start Times, Lifetimes & Deadlines Processing Schedule COMPONENT ARCHITECTURE (Tradesman, Engineer) ICT Components Risk Management Tools & Standards Process Tools & Standards Personnel Man ment Tools & Standards Locator Tools & Standards Step Timing & Sequencing Tools All these cells architectural elements are interrelated and must work together Typical deliverables (from earlier slide) 20

Logical Security Architecture Excerpts for IAM Service Building a portal. Logical architecture shows we need several related security services 1. Inventory: assets to be protected 2. Location: Define nested security domains 4. Mapping of information flow 3. Identify Stakeholders and relations: - Company - Visitors - Vendor 5. Allocate security attributes ID Security Services: - Login - Access Control - Authentication - Identity Management 21

Logical Security Architecture Excerpts for IAM Service Design Patterns can provide Next level of detail Still at logical level, shows high level design of the service Shown here: Starting point for identity management and authentication services is selected from known patterns * * Source: Security Patter Patterns in Practice. Fernandez. 2013 22

Logical Security Architecture Excerpts for IAM Service More detail from design patterns - example class diagram structure for pattern: IDENTITY PROVIDER* Preserves Technical dependency richness at detail level. But still independent of technology or product The logical layer is creates specifications and rationale for the physical layer * Source: Security Patterns in Practice. Fernandez. 2013 23

SABSA Logical Architecture - Design Pattern Synergy Typical Security Design Pattern Elements Title Thumbnail/ intent (brief description of the problem it solves) Situation example (of where this pattern may apply) Context (fully define the context in which it is applicable) Problem description Solution description: text, structure (often UML component diagrams), dynamics (often UML sequence diagram) Implementation guidance, considerations, instructions, cautions Situation example as resolved/ fixed Consequences (side effects) Known uses See also identify related/complementary patterns, dependencies on other patterns SABSA Framework Business attributes profile Risk enablement/control objectives Policy architecture ICT Strategy Basic logical architecture framework Logical (and physical) service lists and definitions in SABSA textbook ch 11, 12 Horizontal and vertical integration among cells and layers Arrows show: This one Enhances That one 24

Security at the Physical Architecture Level - Purpose Purpose of this section: Describe the nature of and distinct value of a physical security architecture Show how the physical architecture relates to other aspects of the enterprise security architecture Define vendor agnostic security technologies Material based on a presentation given at Oct 2013 COSAC Security Conference 25

Physical Security Architecture Focus & Value Define how business information at the logical layer is mapped to data structures such as files and databases Mapping of physical security mechanisms to deliver logical security services Define how the physical security mechanisms embedded within file systems and database systems can be applied to deliver security services required from the logical layer Define rules, practices and procedures to provide the detailed implementation of security policies SABSA provides guidance for P.A. architecture content, e.g.: Business Data Model Security rules, practices & procedures Platforms and Networks Infrastructure (Layout) Security Mechanisms Users, Applications & the UI for Security Platforms and Networks Infrastructure (Capacity Plan and Resilience model) 26

SABSA Architecture Development 27

Physical Layer Development Principles Develop designs that meet requirements from the Logical Layer. Ensure the design supports the requirements of the Business. Ensure the design integrates and interoperates well with all layers of the SABSA Architecture. Does the design introduce unnecessary complexity for the business? Has the design been proven to perform as intended? Consider proven design patterns 28

Application of Design Patterns to ESA Design Patterns Are Helpful because: represent field-tested solutions to common design problems organize design intelligence into a standardized and easily referencable format are generally repeatable by most IT professionals involved with design can be used to ensure consistency in how systems are designed and built can become the basis for design standards are usually flexible and optional (and openly document the impacts of their application and even suggest alternative approaches) can be used as educational aids by documenting specific aspects of system design (regardless of whether they are applied) can sometimes be applied prior and subsequent to the implementation of a system can be supported via the application of other design patterns that are part of the same collection Erl, Thomas (2008-12-31). SOA Design Patterns 29

ESA Design Pattern Examples for the Physical Layer Two examples of Authentication mechanisms: Brokered Authentication: X.509 PKI Brokered Authentication: Security Token Service (STS) 30

Brokered Authentication: X.509 PKI Problem: The environment includes multiple organizational boundaries or autonomous security domains. The authentication broker must be able to issue security tokens that can be used across organizational boundaries.. Solution: Use brokered authentication with X.509 certificates issued by a certificate authority (CA) in a public key infrastructure (PKI) to verify the credentials presented by the requesting application. 31

Brokered Authentication: X.509 PKI Benefits: Authentication can occur over well known Internet firewallfriendly ports through well-known protocols (for example, HTTP/HTTPS over port 80/443). X.509 certificates can be used to authenticate clients and protect messages across organizational boundaries and security domains because the X.509 certificates are based on a broadly accepted standard. PKI using X.509 certificates has the capacity to establish a common basis of trust beyond the scope of individual organizations. X.509 certificates can be distributed openly and used by anyone to encrypt messages to a client or to verify the digital signature of the client. Digital signatures provide a means of supporting nonrepudiation. This is because access to the private key is usually restricted to the owner of the key, which makes it easier to verify proof-of-ownership. 32

Brokered Authentication: X.509 PKI Liabilities: Private keys need to be stored securely (such as on a smart card) and are therefore not as portable as passwords. An attacker could use a private key to impersonate the client. Therefore, you must make sure that the private key is not compromised.. Certificates by themselves are not well suited to provide rolebased security, because role assignment tends to change relatively frequently and X.509 certificates typically have a long life time. However, you can supplement X.509 certificate authentication with a role store to provide more fine-grained authorization capabilities. One possible solution is to combine X.509 authentication with a Lightweight Directory Access Protocol (LDAP) directory or Active Directory with certificate mapping enabled. 33

Brokered Authentication: Security Token Service (STS) Problem: Clients requiring authentication are implemented on a variety of platforms within the organization, and interoperability is required between those platforms. Using a standards based mechanism for authentication helps ensure interoperability between different platforms.. Solution: Use brokered authentication with a security token issued by a Security Token Service (STS). The STS is trusted by both the client and the Web service to provide interoperable security tokens.. 34

Brokered Authentication: Security Token Service (STS) Benefits: This pattern provides a flexible solution for exchanging one type of security token for another to accomplish a variety of goals in a Web service environment, such as authentication, authorization, and exchanging session keys. The solution is not dependent on any one mechanism, such as the Kerberos protocol or X.509 to secure messages. This makes it easier to enable different authentication protocols to interoperate, by adding a level of abstraction on top of existing protocols. Liabilities: The layer of abstraction provided by the STS means that the STS must use another underlying security protocol to provide functionality such as authentication and authorization. This can make the STS a more difficult solution to implement, particularly in cases where a custom solution is used. 35

Wrap Up - Key takeaways for Enterprise Security Architecture Framework to manage enterprise complexity Integrate ESA into the rest of architecture Move from 100% Firefighting to Designed-in Improve the strategic balance in how the security team works Business/Mission Perspective Security Designed (traceably) to enable/sustain the Business/Mission Prioritized investments Clearly identify high value assets and appropriate security protections Moving past compliance Designed to meet Business security objectives, including compliance Address gaps in the NIST approach Holistic Security for the enterprise connecting the Business/Mission with the technical implementation 36

Further Q&A More Discussion 37

Thank you References: Book: Enterprise Security Architecture: a Business Driven Approach (by Sherwood, Clark, Lynas) Main SABSA web site: http://www.sabsa.org/ Introductory white paper: http://www.sabsa-institute.com/ members/sites/default/inline-files/sabsa_white_paper.pdf SABSA courses and certifications: http://www.sabsa.org/training-schedule Annual COSAC conference always includes the SABSA World Congress. This year runs from Sunday 28 September to Thursday 2 October in Naas, Ireland. http://www.cosac.net/ Contact information: Robert Trapp: Robert.Trapp@gmail.com Perry Bryden: Perry.Bryden@gmail.com 38