Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013



Similar documents
Security Controls What Works. Southside Virginia Community College: Security Awareness

Information Security Management Systems

Outsourcing and Information Security

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Governance and Management of Information Security

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Microsoft s Compliance Framework for Online Services

Big Data, Big Risk, Big Rewards. Hussein Syed

Sytorus Information Security Assessment Overview

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

IT Audit in the Cloud

(Instructor-led; 3 Days)

Module F13 The TOGAF Certification for People Program

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

Ecom Infotech. Page 1 of 6

Information Security Management System for Microsoft s Cloud Infrastructure

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Logging In: Auditing Cybersecurity in an Unsecure World

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

The Next Generation of Security Leaders

Cloud Computing Governance & Security. Security Risks in the Cloud

How small and medium-sized enterprises can formulate an information security management system

Advanced Topics for TOGAF Integrated Management Framework

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

Italy. EY s Global Information Security Survey 2013

Lessons from Defending Cyberspace

Open Group SOA Governance. San Diego 2009

Security Architecture and Design from a Business/Enterprise Driven Viewpoint

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

I n f o r m a t i o n S e c u r i t y

Visualizing the Business Impact of Technical Cyber Risks

Effective Use of Assessments for Cyber Security Risk Mitigation

TOGAF 9 Level Exam Study Guide

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

An Analysis of The SABSA Framework. Note: Most of this information comes from the SABSA website. TJS. SABSA Overview

How to bridge the gap between business, IT and networks

COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction

White Paper An Enterprise Security Program and Architecture to Support Business Drivers

IT Governance: The benefits of an Information Security Management System

Reference Process for Enterprise Architecture enabled ICT Planning

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh

ISO COMPLIANCE WITH OBSERVEIT

Information Security Policies and Procedures Development Framework for Government Agencies. First Edition AH

Cybersecurity: What CFO s Need to Know

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Vendor Risk Management Financial Organizations

Enterprise Architectures (EA) & Security

Cybersecurity. Cloud. and the. 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

Network Security Administrator

SECURITY. Risk & Compliance Services

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Executive's Guide to

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Cloud security architecture

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Securing Virtual Applications and Servers

GEARS Cyber-Security Services

Enterprise Cybersecurity: Building an Effective Defense

HKITPC Competency Definition

Security aspects of e-tailing. Chapter 7

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Domain 1 The Process of Auditing Information Systems

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

Cyber Security solutions

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

How To Improve Your Business

Developing Business Architecture with TOGAF

Altius IT Policy Collection Compliance and Standards Matrix

John Essner, CISO Office of Information Technology State of New Jersey

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Cloud Computing Security Framework for Banking Industry

Information Security and Risk Management

Caretower s SIEM Managed Security Services

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

EA-ISP-012-Network Management Policy

Cloud Security and Managing Use Risks

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

Securing the Microsoft Cloud

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Assessing Risks in the Cloud

ArchiMate and TOGAF. What is the added value?

CESG Certification of Cyber Security Training Courses

Compliance Guide: ASD ISM OVERVIEW

SECURITY RISK MANAGEMENT

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes

Information System Audit Guide

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Transcription:

Enterprise Security Architecture for Cyber Security M.M.Veeraragaloo 5 th September 2013

Outline Cyber Security Overview TOGAF and Sherwood Applied Business Security Architecture (SABSA) o o Overview of SABSA Integration of TOGAF and SABSA Enterprise Security Architecture Framework The Open Group EA Practitioners Conference - Johannesburg 2013 2

Cyber Security 1. What is Cyber Security? 2. How is Cyber Security related to information security? 3. How do I protect my company from malicious attacks? "Cyber Security is to be free from danger or damage caused by disruption or fall-out of ICT or abuse of ICT. The danger or the damage due to abuse, disruption or fall-out can be comprised of a limitation of the availability and reliability of the ICT, breach of the confidentiality of information stored in ICT or damage to the integrity of that information. (The National Cyber Security Strategy 2011, Dutch Ministry of Security and Justice) Information security - the "preservation of confidentiality, integrity and availability of information" (ISO/IEC 27001:2005); The Four Types of Security Incidents 1. Natural Disaster 2. Malicious Attack (External Source) 3. Internal Attack 4. Malfunction and Unintentional Human Error 3

Cyber Security in Perspective No official position about the differences between Cyber Security and Information Security Risk Management (ISO/IEC 27001:2005); Information Security ISO/IEC 2700:2009 Business Continuity (BS 25999-2:2007). Cyber Security Information Technology Source: 9 Steps to Cyber Security The Manager s Information Security Strategy Manual (Dejan Kosutic) The Open Group EA Practitioners Conference - Johannesburg 2013 4

Cyber Security in South Africa Source: SA-2012-cyber-threat (Wolf Pack) [ 2012/2013 The South African Cyber Threat Barometer] 5

TOGAF & SABSA Footer Text 9/9/2013 6

SABSA Overview Footer Text 9/9/2013 7

SABSA Meta Model The Open Group EA Practitioners Conference - Johannesburg 2013 8

SABSA Matrix The Open Group EA Practitioners Conference - Johannesburg 2013 9

SABSA Life Cycle In the SABSA Lifecycle, the development of the contextual and conceptual layers is grouped into an activity called Strategy & Planning. This is followed by an activity called Design, which embraces the design of the logical, physical, component, and service management architectures. The third activity is Implement, followed by Manage & Measure. The significance of the Manage & Measure activity is that once the system is operational, it is essential to measure actual performance against targets, to manage any deviations observed, and to feed back operational experience into the iterative architectural development process. The Open Group EA Practitioners Conference - Johannesburg 2013 10

SABSA Taxonomy of ICT Business Attributes The Open Group EA Practitioners Conference - Johannesburg 2013 11

SABSA Taxonomy of General Business Attributes The Open Group EA Practitioners Conference - Johannesburg 2013 12

SABSA Operational Risk Model The Open Group EA Practitioners Conference - Johannesburg 2013 13

SABSA integrated with TOGAF Footer Text 9/9/2013 14

A Central Role for Requirements Management Linking the Business Requirements (Needs) to the Security Services which TOGAF does in the Requirements Management Phase and SABSA does via the Business Attributes Profile. These Artefacts needs to be linked to ensure traceability from Business Needs to Security Services. The Open Group EA Practitioners Conference - Johannesburg 2013 15

Requirements Management in TOGAF using SABSA Business Attribute Profiling Business Attribute Profiling: This describes the level of protection required for each business capability. Requirements Catalog: This stores the architecture requirements of which security requirements form an integral part. The Business Attribute Profile can form the basis for all quality requirements (including security requirements) and therefore has significant potential to fully transform the current TOGAF requirements management approach. Business and Information System Service Catalogs: TOGAF defines a business service catalog (in Phase B: Business Architecture) and an information system service catalog (Phase C: Information Systems Architecture). The creation of the information system services in addition to the core concept of business services is intended to allow more sophisticated modelling of the service portfolio. The Security Service Catalog: As defined by the SABSA Logical Layer, this will form an integral part of the TOGAF Information System Service Catalogs. The Open Group EA Practitioners Conference - Johannesburg 2013 16

The Business Attribute Profile Mapped onto the TOGAF Content Meta Model The Open Group EA Practitioners Conference - Johannesburg 2013 17

SABSA Life Cycle and TOGAF ADM The Open Group EA Practitioners Conference - Johannesburg 2013 18

Mapping TOGAF and SABSA Abstraction Layers The Open Group EA Practitioners Conference - Johannesburg 2013 19

Mapping of TOGAF to SABSA Strategy and Planning Phase As the SABSA phases extend beyond the core phases of the TOGAF ADM, the scoping provided by the SABSA Domain Model extends beyond these core phases of TOGAF, both in terms of solution design and system and process management during the operational lifecycle. The Open Group EA Practitioners Conference - Johannesburg 2013 20

Overview of Security Related Artifacts in the TOGAF ADM The Open Group EA Practitioners Conference - Johannesburg 2013 21

Preliminary Phase Security Artifacts The Open Group EA Practitioners Conference - Johannesburg 2013 22

Phase A - Architecture Vision Security Artifacts The Open Group EA Practitioners Conference - Johannesburg 2013 23

Phase B Business Architecture Security Artifacts The Open Group EA Practitioners Conference - Johannesburg 2013 24

Phase C Information Systems Architecture Security Artifacts The Open Group EA Practitioners Conference - Johannesburg 2013 25

Phase D Technology Architecture Security Artifacts The Open Group EA Practitioners Conference - Johannesburg 2013 26

Phase G Implementation Governance Security Artifacts The Open Group EA Practitioners Conference - Johannesburg 2013 27

Phase H Architecture Change Management Security Artifacts The Open Group EA Practitioners Conference - Johannesburg 2013 28

Enterprise Security Architecture - Framework Footer Text 9/9/2013 29

ICT service providers must consider the whole market. Four dimensions to put in one line Requirements national/intern. law industries SOX, PCI DSS customers Frameworks ISO 27002 NIST ISF Service Provider Service Models Cloud (XaaS) Hosting Managed Service Monitoring Service Types Desktop Communication Collaboration Computing Logon The Open Group EA Practitioners Conference - Johannesburg 2013 30

ICT service providers must consider the whole market. Four dimensions to put in one line 4) Mapping Model to demonstrate fulfillment of all types of security requirements 3) Hierarchy of Security Standards delivering information on each level of detail Enterprise Security Architecture» shaping the security of ICT service provisioning «deliver assurance to customers and provide directions for production 1) Produce Standardized Security measures for industrialized ICT production 2) Modular and Structured approach that serves all possible models and offerings The Open Group EA Practitioners Conference - Johannesburg 2013 31

From Requirements to ICT Services. Standardisation is Key requirements identification Corporate Governance, Risk, & Compliance partially overlap customer requirements (Automotive, Finance, Public, ) requirements consolidation standard options full custom conception, integration no-go operations, maintenance industrialized services (established platforms and processes) customer-specific services The Open Group EA Practitioners Conference - Johannesburg 2013 32

Framework for Enterprise Security Architecture Requirements (corporate and customer) Framework for ESA Enablement (ISMS) security management process and reference model (mainly ISO 27001) Enforcement (Practices) controls / techniques (mainly ISO 27002) specific standards impact analysis for non-framework requirements processes including roles for new business, changes and operational services Enterprise Security Architecture Industrialized ESA Services technology platform evidence (monitoring, analytics and reporting) custom services (specific service and realization for a customer) The Open Group EA Practitioners Conference - Johannesburg 2013 33

Framework for ESA. The Enablement Framework with ISMS activities. Activities of the Enablement Framework P1 Define scope and ISMS policy D1 Implement risk handling plan & controls C1 Monitoring & review security incidents A1 Implement identified improvements in ISMS P2 Define risk assessment approach D2 Define process for monitoring the effectiveness of controls C2 Evaluate effectiveness of the controls implemented A2 Implement appropriate corrective and preventative controls P3 Identify risks, derive control obj. & controls D3 Develop security awareness C3 Review risk assessment approach A3 Communicate activities & improvements P4 Approve residual risks D4 Lead ISMS and steer funds C4 Perform and document ISMS audits A4 Ensure improvements achieve targets P5 Draw up statement of applicability (SoA) D5 Implement methods to identify / handle security incidents C5 Carry out management evaluations The Open Group EA Practitioners Conference - Johannesburg 2013 34

Enterprise Security Architecture for ICT Services Considering: Plan Build Run. Sales, Service, Production, (Integration). ESA reflects three types of business: Customer Projects Operations Platform Preparation New Business & Major Changes (Project Business) Bid, Transition, Transformation Set-up for operations Major Changes Operations (Daily Business) Service Delivery Management Provide industrialized and customer specific ICT Services Evidence ESA Platform Define Offering and SDEs Initial set-up of ESA (creation and extension) Maintenance of ESA (improvements) The Open Group EA Practitioners Conference - Johannesburg 2013 35

Considering: Plan Build Run. Sales, Service, Production, (Integration). What? Work areas Who? Roles etc. How? Standards New Business & Change (Project Business) Bid, Transition, Transformation Set-up for operations Major Changes Operations (Daily Business) Service Delivery Management Provide ICT Services Evidence ESA Technology Platform Define Offering and Service Delivery Elements Initial set-up of ESA Maintenance 1 2 3 The Open Group EA Practitioners Conference - Johannesburg 2013 36

Cooperation: Implementation of Roles. Customer Projects, Portfolio, and Operations. Customer Project (bid, transition, transformation) requirements requirements Operations (CMO+FMO) Security Manager ICT SRC Manager Customer Security Manager Security Architects and Experts (engineering) step-by-step transfer of business governance Operations Manager Offering Manager Operations Personnel The Open Group EA Practitioners Conference - Johannesburg 2013 37

Considering: Plan Build Run. Sales, Service, Production, (Integration). What? Work areas Who? Roles etc. How? Standards New Business & Change (Project Business) Bid, Transition, Transformation Set-up for operations Major Changes Operations (Daily Business) Service Delivery Management Provide ICT Services Evidence ESA Technology Platform Define Offering and Service Delivery Elements Initial set-up of ESA Maintenance 1 2 3 The Open Group EA Practitioners Conference - Johannesburg 2013 38

Corporate and Product Security incorporated in one Hierarchy Refinement Pyramid of Standards Corporate Security Policy Requirements for ICT Service Provisioning ( product security ) Examples Corporate Security Rule Base ICT Security Principles ICT Security Standards ICT Security Baselines Certification and Audit Security Measures Security Implementation ISO 27001 Certificate Detailed customer inquiry Software settings, configuration The Open Group EA Practitioners Conference - Johannesburg 2013 39

Demonstrating that Customer Requirements are met Customer Requirements Set of Controls (contractual ) R1 R2 R3 R4 R5 C1 C2 C3 C4 C5 C6 C7 Requirements are met (Suitability) Controls of ESA and its ICT Security Standards Service type: Desktop Communication Collaboration Computing The Open Group EA Practitioners Conference - Johannesburg 2013 40

Evidence and Customer Relation Service Management Security Taxonomy. Certification and 3rd Party Assurance Risk Management Customer Communi cation and Security Release Mngt. and Acceptance Testing Asset and Configuration Management Vulnerability Assessment, Mitigation Plan Logging, Monitoring & Security Reporting System Development Life-Cycle Systems Acquisition and Contracting Hardening, Provisioning & Maintenance Security Patch Management Incident Handling and Forensics Change and Problem Management Business Continuity Management Customer and users Data Center User Identity Management Networks Provider Identity Management Mobile Workplace Security Application and AM Security VM and S/W Image Mngt. Office Workplace Security Remote User Access Gateway and Central Services Computer Systems Security Database and Storage Security User LAN Periphery Corporate Provider Access Data Center Networks Operations Support Security Wide Area Network Data Center Administration Network Security Security Security Footer Text 9/9/2013 41

EAS Meta Model Application Models Application Glossaries Industry Glossaries Industry Reference Models Model World Architecture Repository Standardized Content, e.g. business processes, applications etc. Meta-Model Common Language Real World Enterprise applications teams & information Queries, Analysis, Portfolios, etc. Stakeholder Views Integrated and consistent Views Stakeholder specific views & reports The Open Group EA Practitioners Conference - Johannesburg 2013 42

ICT Security Services and Solutions Business Integration Embedding security in processes, defining goals and responsibilities, ensuring good governance and compliance. Enterprise Security Management Architecture and Processes Applications, Risk and Compliance Security and Vulnerability Management Business Enablement Enabling the managed use of ICT resources and IT applications with digital identities, roles and rights. Identity and Access Management Users and Identities Smart Cards Trust Centers Business Protection Defending from hostile action: protecting networks, IT applications, data and building security ICT Infrastructure Security Workplace, Host and Storage Security Network Security Physical Security The Open Group EA Practitioners Conference - Johannesburg 2013 43

If you have one last breath use it to say... The Open Group EA Practitioners Conference - Johannesburg 2013 44