Enterprise Security Architecture Concepts and Practice



Similar documents
Data Security and Healthcare

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Network Security Administrator

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Information Technology Security Guideline. Network Security Zoning

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Introduction to Cyber Security / Information Security

How To Write An Architecture For An Bm Security Framework

Building Reference Security Architecture

How To Protect Your Network From Attack

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Common Criteria. Introduction Magnus Ahlbin. Emilie Barse Emilie Barse Magnus Ahlbin

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Module 1: e- Learning

Entrust IdentityGuard Comprehensive

Eleventh Hour Security+

Unifying IT Vision Through Enterprise Architecture

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

ICANWK602A Plan, configure and test advanced server based security

Tivoli Access Manager for e-business FP4 with Tivoli Federated Identity Manager FP2 Security Target

H.I.P.A.A. Compliance Made Easy Products and Services

Firewall Environments. Name

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

McAfee Next Generation Firewall (NGFW) Administration Course

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Achieving PCI-Compliance through Cyberoam

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

IT Networking and Security

This research note is restricted to the personal use of

ICAWEB423A Ensure dynamic website security

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Vidder PrecisionAccess

Vendor Audit Questionnaire

This course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise.

Simplify Your Network Security with All-In-One Unified Threat Management

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

ATTPS Publication: Trustworthy ICT Taxonomy

Lync SHIELD Product Suite

Designing a Windows Server 2008 Applications Infrastructure

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

ICANWK406A Install, configure and test network security

Service Definition Document

Securing Data on Microsoft SQL Server 2012

How Reflection Software Facilitates PCI DSS Compliance

The Bomgar Appliance in the Network

Networking: EC Council Network Security Administrator NSA

2003, Rainbow Technologies, Inc.

The Information Security Problem

Click to edit Master title style Mastertitelformat bearbeiten. Modeling Security Functional Requirements

Agenda. How to configure

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

Web Foundations Series Internet Business Associate

Information and Communications Technology Courses at a Glance

Security as Architecture A fine grained multi-tiered containment strategy

Cybersecurity Definitions and Academic Landscape

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

INFORMATION TECHNOLOGY

IT Networking and Security

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

CESG Certification of Cyber Security Training Courses

Information Technology Branch Access Control Technical Standard

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Cornerstones of Security

Top-Down Network Design

Securing the Cloud through Comprehensive Identity Management Solution

The Weakest Link : Securing large, complex, global Oracle ebusiness Suite solutions

Building A Secure Microsoft Exchange Continuity Appliance

Configuring User Identification via Active Directory

CERN, Information Technology Department

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

MS-55096: Securing Data on Microsoft SQL Server 2012

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Raising Awareness of Issues by Adapting the NIST IT Security Services Model to E-Business Systems. Robert L. Probert, Victor Sawma¹

Ensuring the Security of Your Company s Data & Identities. a best practices guide

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

JOURNAL OF OBJECT TECHNOLOGY

Extended Package for Mobile Device Management Agents

Marimba Client and Server Management from BMC Software Release 6.0.3

IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP. Version: Demo. Page <<1/10>>

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

MCSE Objectives. Exam : TS:Exchange Server 2007, Configuring

Security Design.

Data Security and Governance with Enterprise Enabler

Transcription:

Enterprise Architecture Concepts and Practice Jim Whitmore whitmore@us.ibm.com Presentation to Open Group Oct 22, 2003 Enterprise Architecture

Abstract In the early 90 s IBM Global Services created a Consultancy to respond to the business opportunity for security services for IBM customers and in support of the IBM business. In 1999 there was an initiative in IBM to establish the security discipline within the IT Architect profession, along with related design methods and practitioner support materials. This presentation and discussion will offer a view of security architecture and security architecture methods. Topic Flow: Roles Methods, Models and Modeling for Elements of Enterprise Architecture 2

Roles in solution development projects Project Manager Consultant Architect Specialist A project manager is the person who leads and is accountable for the success of the project. A consultant is an agent of change, who advises and facilitates through: research, data collection, data analysis, preparation and presentation of recommendations, and project design. The IT Architect designs solutions to client business problems through the reasoned application of information technology. IT Specialists develop proof of concepts, design, develop, build, test and implement systems. IT Specialists are the hands on professionals. Business representation of architecture System representation of architecture Physical representation of architecture Stakeholder view Structural view User view Behavior view Environment view Implementation view specialist Operational view architect consultant Project timeline 3

in IBM Global Professions Architecture Architecture involves the design of inter- and intraenterprise security solutions to meet client business requirements in application and infrastructure areas. Architects performing Architecture work must be capable of defining detailed technical requirements for security, and designing, documenting and assuring al and operational architectures using appropriate security technology and process components, and validating that the solution meets the security requirements. 4

Methods, Models and Modeling 5

A design method requires a model and a systematic process with thoughtful constraints Models are developed and applied in several ways: (1) an example is a model with no claims of correctness; (2) a pattern is a model that represents a clear and detailed archetype or prototype; (3) an exemplar is a faultless standard that is the source of comparison; (4) an ideal is the best possible exemplification, either real or conceptual. What category of model is best practice? Modeling is that part of the design process that creates a new form (an instance) from the initial form (a model). It is common practice to iterate through the modeling process several times in order to consider all of the requirements, s and constraints before achieving a balanced solution. On a small scale, modeling can be a mental process for a single individual. Modeling expands dramatically when there are multiple designers and hundreds of diverse requirements that need to be reconciled. 6

Modeling lifecycle Custom Integrated sub-assemblies Mass Customization Plug-and-Play Each instance of architecture is one of a kind. Each overall architecture is one-of-a-kind, with recognizable elements. Basic tools and seasoned reference materials that lead to consistent and repeatable instances of architecture. Self-defining, self configuring technologies that can be integrated using intuitive tools. few artifacts or reliable models prototype models based upon artifacts archetype models vetted patterns Embedded Wireless networking Object oriented programming Wired networking Lifecycle timeline 7

Models for security 8

Depending upon your background, Information Technology may be expressed in various ways. Information Assurance (IA) Information Systems (INFOSEC) 9

Here is an alternate view that aligns knowledge and the responsibility to Application Development, Systems Operations and Network Operations organizations / departments. Authentication Authorization Access Control Callable Services Performance Availability Configuration Operations Application and Data System Network Firewalls Encryption Virtual Private Networks Intrusion Detection 10

However security is described, an effective Information strategy requires a broad understanding of the business landscape Authentication Authorization Access Control Callable Services Information Assurance (IA) Performance Availability Configuration Operations Application and Data System Network Corporate Information Officer perspective Information Systems (INFOSEC) Firewalls Encryption Virtual Private Networks Intrusion Detection 11

and knowledge of how to apply a wide range of security-related technologies. Authentication Authorization Access Control Callable Services Operating Systems Corporate Information Officer perspective Data Applications Application and Data Biometrics Hardware Business Driven Integrated solutions Middleware Cryptographic services Network Perimeters This is not a model! Services System Protocols Performance Availability Configuration Operations Anti-virus Firewalls Encryption Virtual Private Networks Intrusion Detection 12

In support of IBM security practitioners, a conceptual model for s has been developed from Common Criteria Functional Requirements. Subsystems Common Criteria Functional Requirements classes Audit (FAU) Communication (FCO) Cryptographic support (FCS) User data protection (FDP) Identification and authentication (FIA) management (FMT) Privacy (FPR) Protection of s (FPT) Resource utilization (FRU) TOE access (FTA) Trusted path/channels (FTP) Patent Pending # 20020157015 Credential Subsystem Access Control Subsystem Information Flow Control Subsystem Audit Subsystem Solution Integrity Subsystem 13 Method for Designing Secure Solutions, IBM Systems Journal, September 2001 (see References page)

The model provides a bridge between multiple views of Information Systems and Management tasks of policy definition, enforcement and review. Subsystems Authentication Authorization Access Control Callable Services Performance Availability Configuration Operations Credential Subsystem Applications Data Business Driven Integrated solutions Middleware Services Access Control Subsystem Operating Systems Corporate Information Officer perspective Application and Data Biometrics Hardware Cryptographic services Network Perimeters System Protocols Anti-virus Firewalls Encryption Virtual Private Networks Intrusion Detection Information Flow Control Subsystem Audit Subsystem Solution Integrity Subsystem 14

When combined with a thoughtful constraints, this system model can provide a starting point for design as well as a baseline for evaluating the completeness of a design. Output of the design process: 1. Stakeholder view 2. Structural view 3. User view 4. Behavior view 5. Environment view 6. Implementation view 7. Operational view Subsystems Credential Subsystem Access Control Subsystem Some thoughtful constraints: 1. All five subsystems exist in every design 2. All five subsystems are interdependent 3. The strength of security mechanisms and services helps determine trustworthiness of solution 4. The integration of security mechanisms and services with business processes helps determine trustworthiness of solution 5. Some security mechanisms and services may necessarily exist in non-security components Information Flow Control Subsystem Audit Subsystem Solution Integrity Subsystem 15

Modeling for security 16

Functional modeling vs. Pattern-based modeling Custom Each instance of architecture is one of a kind. Design Traceability via documentation Integrated sub-assemblies Each overall architecture is one-of-a-kind, with recognizable elements. Design by best practice? Mass Customization Basic tools and seasoned reference materials that lead to consistent and repeatable instances of architecture. Plug-and-Play Self-defining, self configuring technologies that can be integrated using Design intuitive Traceability tools. via certification Functional / Operational modeling Pattern-based modeling few artifacts or reliable models prototype models based upon artifacts archetype models vetted patterns Embedded Wireless networking Object oriented programming Wired networking Lifecycle timeline 17

Directory -white pages -entitlements ID / passwd JAAS AznAPI Domains Intrusion Detection Biometrics Perimeters Operation practices Service level agreements Storage backup Capacity plan Failover configuration VPN Services -Managed -Emergency Response H/W crypto 4758, TPM -PCIA / PCIC -Tokens/smartcards Monitor - Device - Component - System Testing -Ethical hack Recovery -Disaster plan IBM Functional / Operational Modeling for Credential lifecycle Credential Validation Credential Distribution Enrollment Credential (example) Authorization Authentication Identification Access Control Functional: Technology independent abstraction of security components Attachment Transfer protocol Domain Boundary Flow Control Structural view User view Behavior view Report Analysis Correlation Collection Audit Recovery s Tests Physical and logical Protections Solution Integrity Administration and Policy Mgmt Symmetric and Asymmetric Cryptography Business Driven Solution Packages Middleware Applications Public Key Infrastructure Protocols Privacy Federated Identity Web Services RACF - SAF Identity Mgmt Operational: Technology related mapping of security components Firewalls (example) Kerberos Proxy Access Mgmt Flow Control Environment view Implementation view Operational view Digital Signature Event Mgmt Anti-virus Operational Resilience 18

Here is a sample e-business architecture (see reference page) Reporting Event Alerting Audit Event Analyze Event Logging Component logging Enterprise Architecture Flow Control Access Control Trusted Credential E-Business Community Uncontrolled Controlled Restricted Secured External Community External Attachment SSL Gateway Browser Application Client User/group enrollment Controlled Zone Boundary SSL Gateway User/group approval Managed Community Static Attachment Web Portal Static Attachment SSO Portal Authorizations Credenti Storag Credential Creation Restricted Zone Boundary Managed Community Managed Attachment Secured Application Client Authorizations Credential Distribution Storag Authorizations Credential Storage Secured Zone Boundary Static Attachment SSO Services User/system admin Closed Community Static Attachment Secured Application Server Other userid / pswd SSO Digital Sig Solution Integrity System Integrity Software Integrity Data Integrity Availability Management Policy Audit Service Management 19

Patterns-based modeling a starting point for architecture IBM Patterns for e-business* Business patterns Composite patterns Integration patterns Examples Self service Collaboration Information Aggregation Extended Enterprise e-commerce Portal Account Access Trading Exchange Sell-side hub Buy-side hub Access Integration Application Integration Web Presence Business-to-Consumer Business-to-Business * http://www.ibm.com/developerworks/patterns/ 20

Patterns-based modeling for IBM Patterns for e-business* Business patterns Composite patterns Integration patterns IBM Business Patterns** Business System Mgmt Self service Collaboration Information Aggregation Extended Enterprise e-commerce Portal Account Access Trading Exchange Sell-side hub Buy-side hub Access Integration Application Integration Integration Web Presence Business-to- Consumer Business-to- Business Operational High Assurance - work in progress * http://www.ibm.com/developerworks/patterns/ ** http://www.ibm.com/security/patterns/intro.pdf 21

Patterns-based Modeling Business representation Example Business System using Web Presence model Stakeholder view Business behavior view Information Aggregation Users Users Aggregator Users Data Self Service User Enterprise Systems and Databases Example Business System using Web Presence model System representation with security Business System Management Knowledge processes Policy enforcement processes Structural view System behavior view Information Aggregation Users Users Aggregator Users Data Policy Self Service User Enterprise Systems and Databases Policy 22

Patterns-based Modeling Business pattern: Self-service; Application pattern: Stand-Alone Single Channel Application Services: Access Mgmt with Self-service Identity Mgmt Outside world Demilitarized zone Internal Network Runtime View External Application domain Public Key Infrastructure Access Mgmt Service Mgmt domain User Identity Mgmt Service User view Environment view Implementation view Operational view (example) Domain Name Server User Business application Client Internet Application pattern 1: channel authorization encrypt Protocol firewall Packet filter Reverse proxy Server Mgmt domain Authenticate Relay encrypt Domain firewall Connection filter Web Application Server Presentation Database Directory Service Identity Mgmt App Service Application domain Application Legend Business flow flow Business application Client encrypt Application pattern 1a: channel & content authorization Packet filter Authenticate Relay encrypt Connection filter Presentation Authorize Application Approve integration flow policy or rule application Client Identity Mgmt Application pattern: self-service encrypt Packet filter Authenticate Relay encrypt Connection filter Presentation Authorize ID mgmt app ID mgmt Approve 23

Summary Architecture has multiple views. A design method requires a model and a systematic process with thoughtful constraints The effective practice of security architecture is dependent upon many aspects of the design process. More work needs to be done in the area of architecture representation and visualization. Business representation of architecture System representation of architecture Physical representation of architecture Stakeholder view Structural view User view Behavior view Environment view Implementation view Operational view 24

Selected Resource Links Common Criteria International Telecommunications Union International Organization for Standardisation Internet Engineering Task Force Open Group (TOGAF) IBM Patterns for e-business http://www.commoncriteria.org/ http://www.itu.int/home/index.html http://www.iso.ch http://www.ietf.org/ http://www.opengroup.org/togaf/start.htm http://www.ibm.com/developerworks/patterns/ IBM Systems Journal: Design Method http://researchweb.watson.ibm.com/journal/sj/403/whitmore.html Enterprise Architecture Redbook http://www.redbooks.ibm.com/redbooks/pdfs/sg246014.pdf 25