SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Five Essential Enterprise
               Architecture Practices to Create the
                   Security-Aware Enterprise




Presented by
The Enterprise Architect is                              :
               Ideally Positioned to Help
               Improve IT Security.
               Security efforts need to help the business achieve its
               objectives while reducing risk, whether the
               enterprise wants to:
                Launch a new Web site.
                  Create a database.
                  Build a collaboration platform.
                  Embrace mobility.
                  Move to Cloud computing.


Presented by
Everything with which the Enterprise Architect
               is charged speaks directly to business
               alignment–across technologies, workflows
               and roles!




Presented by
The Enterprise Architect’s
               Charges* Include:                                        :
                  Supporting enterprise goals.
                  Helping build and support business processes.
                  Enhancing organizational structure and culture.
                  Designing sustainable IT systems and applications.

               *All of which must be done with security in mind.




Presented by
Business Alignment Falters When
                                                                              !
               Security is Bolted on, not Built in.
                Despite the importance of IT security in keeping data
                 and enterprise systems secure and ensuring that the
                 enterprise operates within regulatory compliance
                 requirements, the tendency is to add security onto systems
                 after they‘ve been built.

                Or worse, after they‘ve been deployed.



Presented by
The High Cost of Failure                                                                   !
                Generally, it is much more difficult to add security to a
                   system after it has been designed or once deployed than it is
                   to build it right to begin with.
                Worse yet, bolt-on approaches are more likely to lead to
                   costly security failures, such as breaches:

               High Price of a Security Failure
               Cost of a data breach                                        $214 per compromised record

               Average cost per data breach event                           $7.2 million

               Source: Ponemon Institute U.S. Cost of a Data Breach report, 2011



Presented by
Driving Coordination, Effecting Change
                Building inherently secure applications and systems requires
                 tight, open and upfront coordination among many groups.

                Enterprise architects are in the position to drive that
                 coordination and effect the required change that depends on it.

                Because their work is so integral to business alignment−and to
                 driving the agility the enterprise requires to deliver better
                 business service–enterprise architects have a firm
                 understanding of how systems are being deployed, as well as
                 knowledge of the business objectives behind these systems.

Presented by
Thus:                                                       :
                The enterprise architect can drive value in aligning security
                 teams, quality assurance teams, developers, the office of the
                 CIO, and business managers and executives.

                All those parties — in conjunction with the enterprise architect
                 — must work together to ensure that the focus and resources
                 necessary to maintain a secure IT posture are in place.




Presented by
Still, This Won’t Be Easy . . .                               …
               This may be the first time all of these groups work together early
               in the solutions creation process. Expect tension. For instance:

                Security teams may request certain controls that could seem
                 onerous to others involved in the effort (including enterprise IT
                 architects).

                Developers may view security as a roadblock at times–and
                 shun its input.




Presented by
Taking the Lead, Breaking Bad Habits
                59 percent of enterprise development teams are not
                 following quality and security processes "rigorously"
                                                                                                                      :
                 when developing new software.
                26 percent have few or no secure software
                 development processes.
                Only 48 percent claim to follow audit procedures
                 rigorously.
                More than 70 percent felt that there was insufficient
                 security guidance for key technology models such as
                 cloud, virtualization, mobile devices and mainframes.
Presented by     Source: Creative Intellect Consulting, “The State of Secure Application Lifecycle Management.” The report was
                 based on a survey of software development, IT and information security professionals around the world.
―We‘d like to see organizations taking a multi-faceted
                                                                               ”
               approach to tackling the…security challenge.
               ‗Secure by Design and Practice‘ should be the call to action
               adopted by organizations to address the software security
               challenge more directly.‖

                      —Bola Rotibi, founder of Creative Intellect Consulting




Presented by
Five Essential Enterprise Architecture
                  Practices to Create
             the Security-Aware Enterprise




               1. Get executive sponsorship.
               2. Foster a collaborative environment.
               3. Pick, at first, easily attainable projects.
Presented by
               4. Evaluate security risks during planning & design.
               5. Build security processes into workflow.
Step 1: Get Executive Sponsorship



               In order for enterprise architects to get security, operations
               and other teams to work cohesively together, it‘s helpful to
               insert executive leadership into the process, so they can set
               business objectives and expectations across teams. Should
               security processes or communications break down, executive
               leadership can reiterate those processes‘ importance to the
               business.
               Without such political cover, efforts can quickly fray and
               fall apart.

Presented by
Step 1: Get Executive Sponsorship



               Setting the stage for the integration of security through the
               development process will change how new initiatives are built,
               and how the operations work together. Win political
               sponsorship to get started by:
                Showing business leaders the threats against the company.
                Demonstrating how integrating security into a product or
                 application from the start can reduce risk.
                Demonstrating areas where cost of securing systems can be
                 reduced through integrating security processes with design.
Presented by
Step 1: Get Executive Sponsorship



               This level of sponsorship should be easier today than it was
               just a few years ago, as security is reporting less often to
               the CIO‘s office and increasingly to the board of directors.
               That‘s a level of recognition for their work that can‘t be
               ignored by any other groups associated with a project:




Presented by
Step 1: Get Executive Sponsorship



               The Changing Reporting Structure for CISOs/Equivalent
               Information Security Leaders




               Source: PricewaterhouseCoopers LLP: 2011 Global State of Information Security Survey
               * This calculation measures the difference between response levels over a three-year period from 2007 to 2010.


Presented by
Step 2: Foster a Collaborative
                 Environment, Starting with the
                 Security Team



               Encourage information security‘s involvement as an enabler.
               Engage with the CISO‘s office as a consultative resource to
               evaluate the business risk of new initiatives and have the staff
               propose alternatives for reducing that risk.




Presented by
Step 2: Foster a Collaborative
                  Environment, Starting with the
                  Security Team



               What would collaboration entail?

               Example: A new application is to be built. The enterprise
               architect can bring the security team into the picture during the
               design phase to evaluate access controls, secure architecture
               and deployment, and how such things as data
               encryption, digital certificates and other components could be
               built to optimize security and regulatory compliance for this
               effort and to apply to future efforts as part of a wider EA
Presented by
               blueprint.
―Most organizations‘ enterprise IT architects find that they
                                                                              ”
               are constantly battling with the information
               security groups rather than truly consulting with them.‖

               —CISO at regional healthcare provider.
               They translate IT security personnel’s natural caution as
               meaning that the group default is to just say no.




Presented by
Step 3: Start with Easily
                  Attainable Projects




               As this is probably the first time that groups ranging from
               security to development have collaborated from the start of
               a project, it‘s advisable that the initial project not be a
               major business initiative. An easy win, or a couple of easier
               wins, in the beginning will help teams to learn how to work
               together and get processes right, and build a foundation of
               credibility and trust.



Presented by
Step 3: Start with Easily
                  Attainable Projects




               Consider small-in-scope projects, such as a focused
               departmental initiative. Examples include helping a team
               build security into the initial design of:
                A mobile application for a select group of field workers.
                A new database for emerging market customers.
                A new e-commerce application dedicated to a particular
                 segment of B-to-B clients.


Presented by
―Whenever trying to effect organizational change, it's
                                                                         ”
               always smart to start smaller, perfect those processes,
               and then apply them more broadly over time.‖

               — Pete Lindstrom, Research Director at the market
               research firm Spire Security.




Presented by
Step 4: Evaluate Risks During
                  Planning & Design



               Enterprise architects should focus on ensuring that the
               group lets the security team do what it does best: find and
               evaluate risk. If it's a database front-end being deployed on
               tablets, as a simple example, have the security team do the
               vetting and report back to the enterprise architect and the team
               for remediation.




Presented by
Step 4: Evaluate Risks During
                  Planning & Design



               To rank risks and develop ways to mitigate them,
               ask the following questions:                                  ?
                How might the deployment of new technologies potentially
                 introduce vulnerabilities and compromise workloads?
                How is the data being collected and/or access classified?
                What job roles are permitted access?
                What credentials will be used for authentication?
                Has the application code had a security review?
                What industry or government regulations come into play?
Presented by
Step 5: Build Security Processes
                   Into Workflow


                Over time, the practice of designing security into new
                 initiatives will become part of the organizational fabric.
                Security, operations and the enterprise architect‘s office will
                 learn how to work effectively together.
                Processes will be put into place that will improve the overall
                 IT security of the organization.
                Checkpoints will be put into place so that the risk posture of
                 new initiatives can be evaluated as they move from design
                 through production.
                After a few successes and lessons learned, the processes and
Presented by
                 procedures put into place can be used throughout the
                 organization on all new initiatives.
In Conclusion:                                                     :
               Security coordination driven from the enterprise architect will:

                Help align security with business objectives.
                Secure new initiatives more cost-effectively.
                Develop successful security processes that can be replicated
                 throughout the organization.
                Lead to a decline in the risk of data breaches.
                Lead to an increase in regulatory compliance.



Presented by
The End-State:                                                   :
               ―I firmly believe that having an enterprise architect who is a
               partner of the information security group (and vice versa)
               removes a number of barriers to the design and deployment of
               new solutions and allows them to be delivered quickly within
               policy guidelines and with acceptable levels of risk.‖

                            —Enterprise architect, global engineering company




Presented by

Weitere ähnliche Inhalte

Was ist angesagt?

Why so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailWhy so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailRita Barry
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 DefenderMighty Guides, Inc.
 
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...Mighty Guides, Inc.
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
Oep light
Oep lightOep light
Oep light7change
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 
Citrix: 7 Experts on Transforming Employee Experience
Citrix: 7 Experts on Transforming Employee ExperienceCitrix: 7 Experts on Transforming Employee Experience
Citrix: 7 Experts on Transforming Employee ExperienceMighty Guides, Inc.
 

Was ist angesagt? (17)

Avoiding Data Breaches in 2016: What You Need to Kow
Avoiding Data Breaches in 2016: What You Need to Kow Avoiding Data Breaches in 2016: What You Need to Kow
Avoiding Data Breaches in 2016: What You Need to Kow
 
Why so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailWhy so many SIEM Implmentations Fail
Why so many SIEM Implmentations Fail
 
Avoiding Data Breaches in 2016: What You Need to Know
Avoiding Data Breaches in 2016: What You Need to Know Avoiding Data Breaches in 2016: What You Need to Know
Avoiding Data Breaches in 2016: What You Need to Know
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Oep light
Oep lightOep light
Oep light
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
infosec-it
infosec-itinfosec-it
infosec-it
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
 
Embedding Security in IT Projects
Embedding Security in IT ProjectsEmbedding Security in IT Projects
Embedding Security in IT Projects
 
Leading Enterprise Wide Projects
Leading Enterprise Wide ProjectsLeading Enterprise Wide Projects
Leading Enterprise Wide Projects
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
Citrix: 7 Experts on Transforming Employee Experience
Citrix: 7 Experts on Transforming Employee ExperienceCitrix: 7 Experts on Transforming Employee Experience
Citrix: 7 Experts on Transforming Employee Experience
 

Ähnlich wie Five Essential Practices for Security-Aware Enterprise Architecture

Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...UBM_Design_Central
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITYRazorpoint Security
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxelinoraudley582231
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Apoorva Ajmani
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesMighty Guides, Inc.
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdfJose R
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Dev week cloud world conf2021
Dev week cloud world conf2021Dev week cloud world conf2021
Dev week cloud world conf2021Archana Joshi
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up EMC
 
Secure Soft Development Life Cycle .pptx
Secure Soft Development Life Cycle .pptxSecure Soft Development Life Cycle .pptx
Secure Soft Development Life Cycle .pptxOrlando Trajano
 
111.pptx
111.pptx111.pptx
111.pptxJESUNPK
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itAvancercorp
 
2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccessasundaram1
 

Ähnlich wie Five Essential Practices for Security-Aware Enterprise Architecture (20)

Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Dev week cloud world conf2021
Dev week cloud world conf2021Dev week cloud world conf2021
Dev week cloud world conf2021
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
Secure Soft Development Life Cycle .pptx
Secure Soft Development Life Cycle .pptxSecure Soft Development Life Cycle .pptx
Secure Soft Development Life Cycle .pptx
 
111.pptx
111.pptx111.pptx
111.pptx
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid it
 
2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess
 

Kürzlich hochgeladen

Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 

Kürzlich hochgeladen (20)

Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 

Five Essential Practices for Security-Aware Enterprise Architecture

  • 1. Five Essential Enterprise Architecture Practices to Create the Security-Aware Enterprise Presented by
  • 2. The Enterprise Architect is : Ideally Positioned to Help Improve IT Security. Security efforts need to help the business achieve its objectives while reducing risk, whether the enterprise wants to:  Launch a new Web site.  Create a database.  Build a collaboration platform.  Embrace mobility.  Move to Cloud computing. Presented by
  • 3. Everything with which the Enterprise Architect is charged speaks directly to business alignment–across technologies, workflows and roles! Presented by
  • 4. The Enterprise Architect’s Charges* Include: :  Supporting enterprise goals.  Helping build and support business processes.  Enhancing organizational structure and culture.  Designing sustainable IT systems and applications. *All of which must be done with security in mind. Presented by
  • 5. Business Alignment Falters When ! Security is Bolted on, not Built in.  Despite the importance of IT security in keeping data and enterprise systems secure and ensuring that the enterprise operates within regulatory compliance requirements, the tendency is to add security onto systems after they‘ve been built.  Or worse, after they‘ve been deployed. Presented by
  • 6. The High Cost of Failure !  Generally, it is much more difficult to add security to a system after it has been designed or once deployed than it is to build it right to begin with.  Worse yet, bolt-on approaches are more likely to lead to costly security failures, such as breaches: High Price of a Security Failure Cost of a data breach $214 per compromised record Average cost per data breach event $7.2 million Source: Ponemon Institute U.S. Cost of a Data Breach report, 2011 Presented by
  • 7. Driving Coordination, Effecting Change  Building inherently secure applications and systems requires tight, open and upfront coordination among many groups.  Enterprise architects are in the position to drive that coordination and effect the required change that depends on it.  Because their work is so integral to business alignment−and to driving the agility the enterprise requires to deliver better business service–enterprise architects have a firm understanding of how systems are being deployed, as well as knowledge of the business objectives behind these systems. Presented by
  • 8. Thus: :  The enterprise architect can drive value in aligning security teams, quality assurance teams, developers, the office of the CIO, and business managers and executives.  All those parties — in conjunction with the enterprise architect — must work together to ensure that the focus and resources necessary to maintain a secure IT posture are in place. Presented by
  • 9. Still, This Won’t Be Easy . . . … This may be the first time all of these groups work together early in the solutions creation process. Expect tension. For instance:  Security teams may request certain controls that could seem onerous to others involved in the effort (including enterprise IT architects).  Developers may view security as a roadblock at times–and shun its input. Presented by
  • 10. Taking the Lead, Breaking Bad Habits  59 percent of enterprise development teams are not following quality and security processes "rigorously" : when developing new software.  26 percent have few or no secure software development processes.  Only 48 percent claim to follow audit procedures rigorously.  More than 70 percent felt that there was insufficient security guidance for key technology models such as cloud, virtualization, mobile devices and mainframes. Presented by Source: Creative Intellect Consulting, “The State of Secure Application Lifecycle Management.” The report was based on a survey of software development, IT and information security professionals around the world.
  • 11. ―We‘d like to see organizations taking a multi-faceted ” approach to tackling the…security challenge. ‗Secure by Design and Practice‘ should be the call to action adopted by organizations to address the software security challenge more directly.‖ —Bola Rotibi, founder of Creative Intellect Consulting Presented by
  • 12. Five Essential Enterprise Architecture Practices to Create the Security-Aware Enterprise 1. Get executive sponsorship. 2. Foster a collaborative environment. 3. Pick, at first, easily attainable projects. Presented by 4. Evaluate security risks during planning & design. 5. Build security processes into workflow.
  • 13. Step 1: Get Executive Sponsorship In order for enterprise architects to get security, operations and other teams to work cohesively together, it‘s helpful to insert executive leadership into the process, so they can set business objectives and expectations across teams. Should security processes or communications break down, executive leadership can reiterate those processes‘ importance to the business. Without such political cover, efforts can quickly fray and fall apart. Presented by
  • 14. Step 1: Get Executive Sponsorship Setting the stage for the integration of security through the development process will change how new initiatives are built, and how the operations work together. Win political sponsorship to get started by:  Showing business leaders the threats against the company.  Demonstrating how integrating security into a product or application from the start can reduce risk.  Demonstrating areas where cost of securing systems can be reduced through integrating security processes with design. Presented by
  • 15. Step 1: Get Executive Sponsorship This level of sponsorship should be easier today than it was just a few years ago, as security is reporting less often to the CIO‘s office and increasingly to the board of directors. That‘s a level of recognition for their work that can‘t be ignored by any other groups associated with a project: Presented by
  • 16. Step 1: Get Executive Sponsorship The Changing Reporting Structure for CISOs/Equivalent Information Security Leaders Source: PricewaterhouseCoopers LLP: 2011 Global State of Information Security Survey * This calculation measures the difference between response levels over a three-year period from 2007 to 2010. Presented by
  • 17. Step 2: Foster a Collaborative Environment, Starting with the Security Team Encourage information security‘s involvement as an enabler. Engage with the CISO‘s office as a consultative resource to evaluate the business risk of new initiatives and have the staff propose alternatives for reducing that risk. Presented by
  • 18. Step 2: Foster a Collaborative Environment, Starting with the Security Team What would collaboration entail? Example: A new application is to be built. The enterprise architect can bring the security team into the picture during the design phase to evaluate access controls, secure architecture and deployment, and how such things as data encryption, digital certificates and other components could be built to optimize security and regulatory compliance for this effort and to apply to future efforts as part of a wider EA Presented by blueprint.
  • 19. ―Most organizations‘ enterprise IT architects find that they ” are constantly battling with the information security groups rather than truly consulting with them.‖ —CISO at regional healthcare provider. They translate IT security personnel’s natural caution as meaning that the group default is to just say no. Presented by
  • 20. Step 3: Start with Easily Attainable Projects As this is probably the first time that groups ranging from security to development have collaborated from the start of a project, it‘s advisable that the initial project not be a major business initiative. An easy win, or a couple of easier wins, in the beginning will help teams to learn how to work together and get processes right, and build a foundation of credibility and trust. Presented by
  • 21. Step 3: Start with Easily Attainable Projects Consider small-in-scope projects, such as a focused departmental initiative. Examples include helping a team build security into the initial design of:  A mobile application for a select group of field workers.  A new database for emerging market customers.  A new e-commerce application dedicated to a particular segment of B-to-B clients. Presented by
  • 22. ―Whenever trying to effect organizational change, it's ” always smart to start smaller, perfect those processes, and then apply them more broadly over time.‖ — Pete Lindstrom, Research Director at the market research firm Spire Security. Presented by
  • 23. Step 4: Evaluate Risks During Planning & Design Enterprise architects should focus on ensuring that the group lets the security team do what it does best: find and evaluate risk. If it's a database front-end being deployed on tablets, as a simple example, have the security team do the vetting and report back to the enterprise architect and the team for remediation. Presented by
  • 24. Step 4: Evaluate Risks During Planning & Design To rank risks and develop ways to mitigate them, ask the following questions: ?  How might the deployment of new technologies potentially introduce vulnerabilities and compromise workloads?  How is the data being collected and/or access classified?  What job roles are permitted access?  What credentials will be used for authentication?  Has the application code had a security review?  What industry or government regulations come into play? Presented by
  • 25. Step 5: Build Security Processes Into Workflow  Over time, the practice of designing security into new initiatives will become part of the organizational fabric.  Security, operations and the enterprise architect‘s office will learn how to work effectively together.  Processes will be put into place that will improve the overall IT security of the organization.  Checkpoints will be put into place so that the risk posture of new initiatives can be evaluated as they move from design through production.  After a few successes and lessons learned, the processes and Presented by procedures put into place can be used throughout the organization on all new initiatives.
  • 26. In Conclusion: : Security coordination driven from the enterprise architect will:  Help align security with business objectives.  Secure new initiatives more cost-effectively.  Develop successful security processes that can be replicated throughout the organization.  Lead to a decline in the risk of data breaches.  Lead to an increase in regulatory compliance. Presented by
  • 27. The End-State: : ―I firmly believe that having an enterprise architect who is a partner of the information security group (and vice versa) removes a number of barriers to the design and deployment of new solutions and allows them to be delivered quickly within policy guidelines and with acceptable levels of risk.‖ —Enterprise architect, global engineering company Presented by