Enterprise Security Architecture



Similar documents
SABSA A Brief Introduction

ESKISP Manage security testing

NOS for Network Support (903)

EA-ISP-012-Network Management Policy

Technology Risk Management

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Part A OVERVIEW Introduction Applicability Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

ESKITP Manage IT service delivery performance metrics

IT Architecture Review. ISACA Conference Fall 2003

An Analysis of The SABSA Framework. Note: Most of this information comes from the SABSA website. TJS. SABSA Overview

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101

Certified Information Security Manager (CISM)

Service Definition Document

Lancashire County Council Information Governance Framework

Confident in our Future, Risk Management Policy Statement and Strategy

G-Cloud IV Services Service Definition Accenture Cloud Security Services

Accenture Cyber Security Transformation. October 2015

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

ANNEXURE A. Service Categories and Descriptions 1. IT Management

Data Protection Act Guidance on the use of cloud computing

IT Governance Charter

ehealth Architecture Principles

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

External Supplier Control Requirements

CISM ITEM DEVELOPMENT GUIDE

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

Challenges of Analytics

How small and medium-sized enterprises can formulate an information security management system

Cybersecurity The role of Internal Audit

Practical Overview on responsibilities of Data Protection Officers. Security measures

Domain 1 The Process of Auditing Information Systems

Risk Management Policy

{Add company name} {Add geographical location} {Add/edit as required} Enterprise Architect. {Add local information}

Security Architecture and Design from a Business/Enterprise Driven Viewpoint

Ensuring Cloud Security Using Cloud Control Matrix

IoT & SCADA Cyber Security Services

Enterprise Architectures (EA) & Security

TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL

DATA QUALITY MATURITY

JOB DESCRIPTION CONTRACTUAL POSITION

ESKISP Conduct security testing, under supervision

NHS Commissioning Board: Information governance policy

Security Risk Management Strategy in a Mobile and Consumerised World

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

Cyber Security: from threat to opportunity

Setting goals and measuring the value of Enterprise IT Architecture using COBIT 5 framework

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two

COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

CIO, CISO and Practitioner Guidance IT Security Governance

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

Building Reference Security Architecture

SECURITY RISK MANAGEMENT

The potential legal consequences of a personal data breach

Keyfort Cloud Services (KCS)

White Paper. Enterprise Information Governance. Date Released: September Author/s: Astral Consulting.

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015

Defending against modern cyber threats

Alternative Investment Fund Managers Directive. What does this mean for your business?

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

Smart Security. Smart Compliance.

Franchise Data Compromise Trends and Cardholder. December, 2010

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé

Enabling Data Quality

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Aberdeen City Council IT Security (Network and perimeter)

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

Cloud Vendor Evaluation

Specialist Cloud Services. Acumin Cloud Security Resourcing

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

2009 Solvay Brussels School and IT Governance institute

Cloud Security Who do you trust?

Proposed guidance for firms outsourcing to the cloud and other third-party IT services

Cybersecurity and internal audit. August 15, 2014

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority

Cloud Security Who do you trust?

CIO, CISO and Practitioner Guidance IT Security Governance

H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments

Ghana Government Enterprise Architecture Implementation Guide

How to ensure control and security when moving to SaaS/cloud applications

Cyber Security - What Would a Breach Really Mean for your Business?

Enterprise Security Tactical Plan

FormFire Application and IT Security. White Paper

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Security Architectures for Cloud Computing

Transcription:

Enterprise Architecture -driven security April 2012

Agenda Facilities and safety information Introduction Overview of the problem Introducing security architecture The SABSA approach A worked example architecture components Facilitated discussion Page 2 26 April 2012 ISACA Seminar Enterprise Architecture

The Problem: Information The business perspective Page 3 26 April 2012 ISACA Seminar Enterprise Architecture

The problem: answering the difficult questions How do we demonstrate alignment with the business risks? Are we spending too much or on the right things? How do we ensure security supports the business? How do we embed security in the wider business? How do we keep business and security aligned? How do we minimise security gaps and remediation costs Page 4 26 April 2012 ISACA Seminar Enterprise Architecture

Introducing security architecture? Traditional architecture vs. security architecture What type of structure do I want? Why do I want this structure? How will it be used? Who will be the users of the structure? Where should the structure be located? When will it be used? What type of information system is being considered and what will it do? Why is it needed? How will it be used? Who will use it? Where will it be used? When will it be used? Building a physical structure Protecting business information Designing a secure business information system could take a number of directions, but there is considerable potential for the security and business requirements to clash and neither party is satisfied with the end result. The answers to these questions provide the architect with the business requirements which can then be fed into the design process. Page 5 26 April 2012 ISACA Seminar Enterprise Architecture

How do I solve this problem What is business security architecture? Usability Risk Cost The challenge in developing the architecture is to balance between risk, cost and usability architecture controls are composed of people, process and technology controls An organisation needs security controls that are: Driven by business requirements rather than technical considerations Directly traceable to business objectives Designed from the outset to be cost-effective, avoiding remediation effort Meet legal, regulatory and policy compliance requirements by design Are appropriate to both the business risks and organisation s risk appetite Page 6 26 April 2012 ISACA Seminar Enterprise Architecture

Why do this? Benefits of the security architecture approach Customised information security control framework Driven by the organisation s business requirements Meeting compliance Alignment with the business risk appetite Reduces information security, IT and security audit costs Eliminates redundant controls Reduces ad hoc security implementation Provides detailed agreed security requirements Informs executive management about security risk Articulates impact of information security risk in business terms Provides structured control framework to evaluate compliance Creates foundation for quantitative assessment of security ROI Page 7 26 April 2012 ISACA Seminar Enterprise Architecture

The SABSA approach Step by step driver attributes Threat analysis Impact analysis Control objectives services Driver Attributes Threat analysis Impact analysis Control Objectives services Identify the business drivers/ objectives. Prioritise drivers. Translate drivers into business security attributes. attributes are provided by SABSA framework. Perform threat analysis. Identify actual threats to business attributes/ business drivers. Use qualitative or quantitative methods to define impact of the realisation of the threat on the identified business objectives. Define control objectives to mitigate the identified threats to acceptable levels. Identify security services to provide the required controls objectives. Page 8 26 April 2012 ISACA Seminar Enterprise Architecture

The SABSA approach An architect s perspective Here comes the science! Assets (What) Motivation (Why) Process (How) People (Who) Location (Where) Time (When) Contextual Conceptual Architect The Attributes Profile Risk Model Control Objectives Process Model Strategies and Architectural Layering Organization and Relationships Design Entity Model and Trust Framework Geography Domain Model Time Dependencies -Related Lifetimes and Deadlines Designer Logical Information Model Policies Services Entity Schema and Privilege Profiles Domain Definitions and Associations Processing Cycle Physical Builder Data Model Rules, Practices and Procedures Mechanisms Users, Applications and the User Interface Platform and Network Infrastructure Control Structure Execution Component Tradesman Detailed Data Structures Standards Build Products and Tools Identities, Functions, Actions and ACLs Processes, Nodes, Addresses and Protocols Step Timing and Sequencing Facilities Operational Manager Assurance of Operational Continuity Operational Risk Management Service Management and Support Application and User Management and Support of Sites, Networks and Platforms Operations Schedule Page 9 26 April 2012 ISACA Seminar Enterprise Architecture

Contextual & conceptual security Understanding the business and its risks Gather, assess and analyse business requirements strategy processes and functions Organisational structure personnel, geographical, partnerships Budgets, technical constraints, time dependencies Describe the business requirements Use the business attributes database to describe the business in terms of strategy, related assets, business goals and objectives business attribute profile Analyse the business risks Perform a threat analysis on the business assets, goals and objectives Define the business impact of the realisation of the threats Identify technical and procedural vulnerabilities Page 10 26 April 2012 ISACA Seminar Enterprise Architecture

An overview of SABSA attributes database Page 11 26 April 2012 ISACA Seminar Enterprise Architecture

A logical security architecture What does it look like? Attributes Profile Control objectives strategies services Attributes Profile Control objectives strategies services Select business attributes (mapped to business drivers). Define enterprisespecific business attributes, a measurement approach, metrics and targets. Derive control objectives from the Attributes Profile and the Risk Model developed at the Conceptual layer. Define appropriate security strategies based on the business process model, the Attributes profile, the control objectives and the assessment of the current state of security Layered model of security services, including: Prevention Containment Detection and notification Event collection and tracking Recovery Assurance Page 12 26 April 2012 ISACA Seminar Enterprise Architecture

A worked example drivers driver Protect customer information Prioritised attributes Compliant Access-controlled Protected Threats Customer data is disclosed to internal users through inappropriate access controls Staff leak customer information to unauthorised third parties Customer information is disclosed in transit to thirdparty processor. Sensitive* customer data is disclosed to unauthorised parties Page 13 26 April 2012 ISACA Seminar Enterprise Architecture

A worked example Control objectives Operations, process and procedures User access management Monitoring user access levels and user activity, particularly third parties Incident response for data breach Technology Identity management Authentication and authorisation Database and network encryption to protect personal data in storage and in transit Auditing and logging of access to sensitive* personal data Control Objectives: Protect customer information attributes Compliant, access-controlled and protected People Compliant Accesscontrolled Protected Training and awareness for all staff on data protection Focussed training for high-risk areas, e.g., call centres Governance Nominated Data Protection Officer Data protection policies, standards and procedures Third party risk management framework Data protection assurance Page 14 26 April 2012 ISACA Seminar Enterprise Architecture

A worked example services Technical security services Technical security services Identity management tools Authentication Access control Authorisation Auditing Storage encryption Link encryption Breach management Incident management Policies, standards, procedures, guidelines Training and awareness Proactive reviews Third party management frameworks Page 15 26 April 2012 ISACA Seminar Enterprise Architecture

architecture deliverables What do you get? Contextual Architecture Drivers Prioritised drivers Impact Assessment Conceptual Architecture Attribute Profile Risk Model Domain Model Logical Architecture Domains and associations Logical security services framework Physical and Component Architecture Detailed infrastructure and component solution design Documented controls against control objectives Operational security control framework Page 16 26 April 2012 ISACA Seminar Enterprise Architecture

Portrait of a successful security architect An architect s skill-set is different from a tradesman Understands the business strategy and objectives There are more than just security requirements Thinks in business terms at all times Why are we doing this? What are we trying to do? Has good communication skills Bridges the gaps between business and technology Maintains strength of character Defends the security architecture Meets the constant challenge Page 17 26 April 2012 ISACA Seminar Enterprise Architecture

Optimising your investment in security architecture measuring success Characteristics of a good business security architecture Strategic alignment: aligned to the current business strategy Agility: designing a security architecture to deal with the changing legal, regulatory and client requirements Extensibility: expanding the architecture on a phased based throughout an organisation Robustness: demonstrates a thorough development with appropriate input, review and approval and will withstand critical evaluation from detractors Pragmatism: reflects the operating environment of the organisation and imposes appropriate security controls for the people and culture. Appropriate to both the business risks and organisation s risk appetite Meets regulatory, audit and compliance requirements by design Driven by business requirements rather than technical considerations Good security controls Designed from the project outset to be cost-effective thereby avoiding remediation effort Directly traceable to business objectives Page 18 26 April 2012 ISACA Seminar Enterprise Architecture

Architecture Summary Page 19 26 April 2012 ISACA Seminar Enterprise Architecture

EY Contacts architecture experience Hugh Callaghan Director Direct Tel: +353 (0)1 221 2411 Direct Fax: +353 (0)1 475 0557 Mobile: +353 (0)87 983 8511 E-mail: hugh.callaghan@ie.ey.com Patricia O Gara Senior Manager Direct Tel: +353 (0)1 221 2008 Direct Fax: +353 (0)1 475 0557 Mobile: +353 (0)87 235 6023 E-mail: patricia.ogara@ie.ey.com EoinO Reilly Senior Manager Direct Tel: +353 (0)1 221 2698 Direct Fax: +353 (0)1 475 0557 Mobile: +353 (0)86 770 9820 E-mail: eoin.oreilly@ie.ey.com VasilijsMihailovs Assistant Direct Tel: +353 (0)1 221 2653 Direct Fax: +353 (0)1 475 0557 Mobile: +353 (0)86 176 6444 E-mail: vasilijs.mihailovs@ie.ey.com Page 20 26 April 2012 ISACA Seminar Enterprise Architecture

Thank you