SlideShare a Scribd company logo
1 of 46
Information Security Architecture
Building Security into your Organization
The on-going promotion of security…


                    • Increasing threats


                    • Complex Vulnerabilities


                    • Large, intricate
                      solutions required




                                           Copyright 2007 – Seccuris Inc.
We‘re sucked into acting on
           generic justifications!




After implementing large, intricate solutions we have:
• Increased our workload
• Impacted productivity and innovation in the environment
                                                   Copyright 2007 – Seccuris Inc.
The internal challenge…

  What do we hear most from IT & IT Security
       Departments regarding support?


• We are under resourced
• We are fighting a loosing battle
• The “business” is making our
  jobs harder


        We are misaligned with the business!
                                               Copyright 2007 – Seccuris Inc.
Copyright 2007 – Seccuris Inc.
Our key issue…

    We are using Security to undermine
                the business


 • How many organizations business is
   information security?
      • Not Many.
      • Information Security enables the business to operate
        effectively with a properly managed (balanced) risk
        profile.




                                                        Copyright 2007 – Seccuris Inc.
Our key issue…

    We are using Security to undermine
                the business


 • How many organizations business need
   information security?




                                          Copyright 2007 – Seccuris Inc.
Our key issue…

                 Every business requires
                   Trust & Relationships



                 • Information Security
                   ensures:
                       • Trust is maintained
                         appropriately for the
                         level of risk
                       • Relationships are protected
                         and “assured” (AIC)


                                             Copyright 2007 – Seccuris Inc.
Our key issue…

 • Implementing solutions without understanding
   Trust requirements impacts:


   • Productivity
   • Innovation
   • Flexibility




                                            Copyright 2007 – Seccuris Inc.
Why are we undermining the business?



                  Current approach to security
                       solutions undermine:

                    business productivity


                 benefits of new technologies




                                         Copyright 2007 – Seccuris Inc.
Undermining the Business

We implement solutions that focus on security,
              not on business
                      Prevent systems to interface other
                      systems
                          FW, IDS/IPS Solutions

                      Restrict user abilities within the
                      application
                          Application & Database controls

                      Authorize access to information systems
                      & services
                          Web filtering / Instant Messaging
                          Control / SSL VPN

                                                  Copyright 2007 – Seccuris Inc.
Undermining the Business
   We build unnecessary conflict into our
          projects and environment




 • Being on the “Same Team” is seen as a conflict
    • Why is being on the “Same Team” an issue?
    • Who is really accepting the risk?
                                                    Copyright 2007 – Seccuris Inc.
Undermining the Business

            We implement solutions without
        Justification, Prioritization & Completeness

Lacking processes such as:
   • Business Requirements for Information Sharing
   • Privacy and Security Requirements Definition
   • Solution Design Reviews
   • Environment Validation & Health Checks
   • Incident Handling & Forensic Investigation
   • Business Risk acceptance for implemented solutions


                                                          Copyright 2007 – Seccuris Inc.
Undermining the Business

            We implement solutions without
        Justification, Prioritization & Completeness

Lacking processes such as:
   • Business Requirements for Information Sharing
   • Privacy and Security Requirements Definition
   • Solution Design Reviews
   • Environment Validation & Health Checks
   • Incident Handling & Forensic Investigation
   • Business Risk acceptance for implemented solutions


                                                      Copyright 2007 – Seccuris Inc.
Undermining the Business

     Are we undermining the benefits of new
                 technologies?


• Enterprise Storage & Backup Solutions
• Remote Access
• VOIP
• Virtualization



                                          Copyright 2007 – Seccuris Inc.
Improving enablement of the business
                An
  Information Security Framework
               aligns
       controls and solutions
             enabling
        business objectives
             AND US!

                                Copyright 2007 – Seccuris Inc.
SABSA: Enterprise Security Framework

Focuses on:

  • Establishing Business Context
  • Developing a Business Risk Model
  • Developing a Conceptual Trust Model
  • Developing a Security Domain Model
  • Understanding business priorities, environment gaps
    and key strategies to move forward




                                                 Copyright 2007 – Seccuris Inc.
SABSA: Enterprise Security Framework

Focuses on:

  • Establishing Business Context
  • Developing a Business Risk Model
  • Developing a Conceptual Trust Model
  • Developing a Security Domain Model
  • Understanding business priorities, environment gaps
    and key strategies to move forward




                                                 Copyright 2007 – Seccuris Inc.
Developing a Conceptual Trust Model



To secure the organization:
• Identify entities involved with the organization
• Define information flowing between business entities
• Assess the assurance required to establish trust




                                                     Copyright 2007 – Seccuris Inc.
Developing a Conceptual Trust Model




                                  Copyright 2007 – Seccuris Inc.
Developing a Conceptual Trust Model
                                                                                           SABSA – Example Trust Model

                                                                                                                 5. Partner Organizations



                                                                                                   5a. Partner 1                        5b. Partner 2




                                                                              TH9. Financial, Client Personal,
                                                                                                                                  TH10. Financial, Client Personal,
                                                                                  Business Confidential
                                                                                                                                      Business Confidential
                                                                                       Information
                                                                                                                                            Information




                                                                                                            6. Our      Organization

                                                                                                7. Executive Management
                                                                                                                                                                                                                          1. Clients
                                                                                                                                                 8. General
 4. Integrated Suppliers/
                                                                                                                                                                                      TH1. Financial. Personal,
                                                                                                                                                Management
                                                                                                7a. Board           Executive
         Partners                TH8. Intellectual Property,
                                                                                                                                                                                               Health
                            Financial, Employee / Client Personal,
                                                                                                                                                                                            Information
                              Employee / Client Personal Health
                                                                                                                                                                                                                      1a. Target Clients
                                         Information
     4a.
     4 Outsourced
      Delivery (IT)
                                                                                                                 9. Organizational Units
                                                                                                                                                                                          TH2. Client Confidential
                                   TH7 Intellectual Property,                                                                                                                                                            1b. Industry
                                                                                                                                                                                                Information
                                                                                                         9a. Business             9b. Service
                              Financial, Employee / Client Personal,
    4b. Outsourced                                                                                                                                                                                                        Partners
                                Employee / Client Personal Health                                        Administration            Delivery
        Delivery                    Information, Compliance
  (Business/Program)                         Audits,




                                                                                              10. Independent Sales                                                                   TH3. Financial, Performance
                                                                                                                                       11. Sales Agencies                                  Status Information
                                                                                                      Offices
                                                                                                                                                                            TH4. Public
                                                                                                                                                                            Information




                                                                                                                                                                                2. Other Stakeholders

                                                                                                TH6. Intellectual    TH5. Compliance
                                                                                                   Property               Audits,                                     2a. Industry Groups                 2b. Media
                                                                                                                        Sensitive
                                                                                                                       Information




                                                                                                 3. General Suppliers

                                                                                                                                       3c. External
                                                                       3a. Vendors &
                                                                                                     3b. Suppliers                     Regulators
                                                                        Contractors
                                                                                                                                        (e.g. PCI)



                                                                                                                                                                                                                                        Copyright 2007 – Seccuris Inc.
Conceptual Trust Model:
Define Information Sharing
                             Financial, Personal & Health Information




Intellectual Property, Financial Information, Audit Reports

                                                                Copyright 2007 – Seccuris Inc.
Conceptual Trust Model:
Define Trust Requirements
      Our organization provides services to our clients that
      must remain confidential
      from other internal business units / employees,
      as well as external entities.




                                                           Copyright 2007 – Seccuris Inc.
Conceptual Trust Model:
Define Trust Requirements
      Clients provide confidential personal, financial and
      health information that must remain confidential
      from other internal entities, as well as external entities.
      i.e. Payment Card Information




                                                              Copyright 2007 – Seccuris Inc.
Conceptual Trust Model:
Define Trust Requirements




Our organization shares intellectual property relevant to the
business services provided as well as Financial, Personal and Health
information regarding our employees and our clients
that must remain confidential from non-involved internal entities,
as well as non-involved (contractually bound) external entities.

                                                              Copyright 2007 – Seccuris Inc.
Conceptual Trust Model:
Define Trust Requirements




Integrated Suppliers share intellectual property relevant to the
business services provided as well as Financial, Personal and
Health information regarding our employees and clients that
must remain confidential from our clients (direct), non-involved internal
entities, as well as external entities.

                                                               Copyright 2007 – Seccuris Inc.
Developing a Security Domain Model

The security domain model defines three major
  elements:

  1. Structure and scope of the security domains
     within the Organization


  2. Interrelationships to external security domains


  3. Who is the Authority for the Domain


                                                       Copyright 2007 – Seccuris Inc.
Developing a Security Domain Model
                                        D1. Our Organization
                                   D3. Executive Management



                                          D3a. Board

                                                                      D2. Organizational Units
                                           Executive


                                                                  D3a. Business
                     D4. General                                                       D3b. Program
                                                                  D2a. Business                             DR1               D12. Clients
                                                                   Enablement          D3b. Program
                     Management                                                          Services
                                                                   Enablement
                                                                        s
                                                                  D2a. Business        D2b. Service
                                                                    Services             Services
                                                                    Services
                                                                  Administration General Delivery
                                                                           D16.
                                                                             Suppliers                  DR2

             DR7                      D5. Independent
                                       Sales Offices                                                  DR3

                                                                                                                    D11. General
                                                                                                                      General
                                                                                                                     Suppliers
                                                                                                                     Suppliers
D6. Sales Agencies


                                                                                    DR4
                              DR6
                                                                                                            ASD
                                                        DR5
                                                                                                             (IT)
                                                                                                            ASD
                                                                                                      D10. Integrated
                                                                                                            (IT)
                                                                                                         Suppliers
                                                                                        ASD
                                                                                                        (Business)
                                                                                         (IT)
                                                                                       ASD
                           Other                                                  D9. Integrated
                                                                                        (IT)
                          Other
                       Governments                                                  Suppliers
                       D7. Partner
                      Governments
                                                                                       (IT)
                      Organizations
                                                    D8. Other
                                                   Stakeholders


                                                                                                                              Copyright 2007 – Seccuris Inc.
Developing a Security Domain Model


    D1. Our Organization

            D2. Organizational Units


        D3a. Business        D3b.
                             D3b Program
        D2a.
        D2a Business                         DR1            D12. Clients
         Enablement          D3b. Program
                               Services
         Enablement
              s
        D2a. Business         D2b. Service
          Services             Services
          Services
        Administration General Delivery
                 D16.
                                              DR3
                   Suppliers




                                                          ASD
                                                           (IT)
                                                          ASD
                                                    D10. Integrated
                                                          (IT)
                                                       Suppliers
                                                      (Business)




                                                                  Copyright 2007 – Seccuris Inc.
Security Domain Model: Authority & Scope

            Domain Authority: Our CIO
               Our organization encompasses all management
               (executive and general), Organizational Units and
               Sales (Independent and Agency) entities owned
               and legally controlled by our organization.




                                                    Copyright 2007 – Seccuris Inc.
Security Domain Model: Authority & Scope

            Domain Authority: Org Unit President
                Organizational Units encompass the specific
                Business Administration and Service Delivery
                Functions for each unique OU entity.
                (Including IT Services & Functions)




                                                     Copyright 2007 – Seccuris Inc.
Security Domain Model: Authority & Scope

            Domain Authority: Integrated Supplier
                Integrated Suppliers (Business) encompass any
                specific external entity controlling one or many
                smaller entities that provide outsourced business
                functions to any specific Organizational Unit.




                                                      Copyright 2007 – Seccuris Inc.
Security Domain Model: Authority & Scope

            Domain Authority: Client (Individual)
                Clients encompass both specific target clients
                as well as industry partners relevant to our
                organizations service offerings.




                                                      Copyright 2007 – Seccuris Inc.
Using Trust & Relationships

The tools we have used:
  • Entity Diagram               Relationships

  • Trust Relationship Diagram Trust
  • Security Domain Diagram      Authorities

  • Boundary Control Inventory




                                               Copyright 2007 – Seccuris Inc.
Defining Boundary Controls

DR#        Boundary Description                 Boundary Controls

DR3 Our Organization interacting with Organizational
                                      •Contracts/Agreements
    Integrated Suppliers (Business)
                                      •Service Level Agreement
                                      •Internal Policy (InfoSec)
                                      •Industry Compliance
                                      Requirements
                                      •Legislation, regulations, and acts

                                        Technical
                                        •Firewall / ACLs
                                        •Segmented VLANs for Supplier
                                        •Intrusion Prevention Systems
                                        (NIDS)
                                        •Intrusion Prevention Systems
                                        (HIDS)

                                                                 Copyright 2007 – Seccuris Inc.
Defining Boundary Controls

DR#        Boundary Description                 Boundary Controls


DR1 Our Organization interacting with Organizational
                                      •Contracts/Agreements
    Clients
                                      •Internal Policy (InfoSec)
                                      •Legislation, regulations, and acts

                                        Technical
                                        •Firewall / ACLs
                                        •Intrusion Prevention Systems
                                        (NIDS)
                                        •User Account Roles (Web SVC)




                                                                 Copyright 2007 – Seccuris Inc.
Defining Boundary Controls

Review defined boundary controls:
  • What relationships have the most complex control
    requirements?     Prioritization



  • What relationships lack controls? Completeness


  • How many boundaries share common controls?

                    Justification

                                                 Copyright 2007 – Seccuris Inc.
Improving your Security Program

How do you use Trust and Security Domain Models to
  improve your Information Security posture?


What should we think about when implementing:
  • IDS / IPS
  • Database Security
  • Web filtering / Instant Messaging Control / SSL VPN




                                                  Copyright 2007 – Seccuris Inc.
Defend your boundaries




•   Focus on Automated Policy Enforcement on clearly understood boundaries
    where information sharing requirements are well defined.


•   Free resources to focus on higher level business risks


•   Restrictive Firewalls / IPS / UTM / Content Filtering

                                                                  Copyright 2007 – Seccuris Inc.
Defend your boundaries
                                        D1. Our Organization
                                   D3. Executive Management



                                          D3a. Board

                                                                      D2. Organizational Units
                                           Executive


                                                                  D3a. Business
                     D4. General                                                       D3b. Program
                                                                  D2a. Business                            DR1                  D12. Clients
                                                                   Enablement          D3b. Program
                     Management                                                          Services
                                                                   Enablement
                                                                        s
                                                                  D2a. Business         D2b. Service
                                                                    Services             Services
                                                                    Services
                                                                  Administration General Delivery
                                                                           D16.
                                                                             Suppliers
                                                                                                        DR2
             DR7                      D5. Independent
                                                                                                       DR3
                                       Sales Offices

                                                                                                                     D11. General
                                                                                                                       General
                                                                                                                      Suppliers
                                                                                                                      Suppliers
D6. Sales Agencies


                                                                                    DR4
                             DR6
                                                                                                             ASD
                                                        DR5                                                   (IT)
                                                                                                             ASD
                                                                                                       D10. Integrated
                                                                                                             (IT)
                                                                                                          Suppliers
                                                                                        ASD
                                                                                                         (Business)
                                                                                         (IT)
                                                                                       ASD
                           Other                                                  D9. Integrated
                                                                                        (IT)
                          Other
                       Governments                                                  Suppliers
                       D7. Partner
                      Governments
                                                                                       (IT)
                      Organizations
                                                    D8. Other
                                                   Stakeholders

                                                                                                                             Copyright 2007 – Seccuris Inc.
Protect your core

• Focus verbose detective tools within boundaries to allow for
  business focused investigation to occur


   • Generic DB attack from the outside world
       • Automated Block – Move on


   • Generic DB attack from the inside world
       • Review Block – Monitor / Investigate / Respond


• IDS/IPS / Database Security Controls / Investigative Process



                                                             Copyright 2007 – Seccuris Inc.
Protect your core




                    Copyright 2007 – Seccuris Inc.
Enable your business

         Build strategies that align with
   Trust and Information Sharing requirements


• Using Trust Modeling and Security Domains we clearly know:
   • What is at stake
   • To what level we must protect the relationship and information
   • Who decides what risk level is acceptable
   • Who accepts the residual risk




                                                                      Copyright 2007 – Seccuris Inc.
Enable your business with an
Information Security Framework

• Improve visibility to security boundaries and identify Trust issues


• Free to focus on building new solutions enabling information sharing


• Demonstrates linkages between the business and chosen strategy &
  solutions


• Prioritizes implementation of controls




                                                                Copyright 2007 – Seccuris Inc.
Conclusion
      We can implement solutions with
  Justification, Prioritization & Completeness
                   Seccuris will assist with:

                      • Strategy & Framework

                      •Process Development

                      • Solution Creation & Validation

                      • Implementation

                      • Monitoring & Response
                                                Copyright 2007 – Seccuris Inc.
Thanks

Michael Legary, CSA, CISSP, CISM, CISA, CCSA, CPP, GCIH, PCI-QSA
  Founder & CIO
  Seccuris Inc.


  Email:       Michael.Legary@seccuris.com
  Direct:      204-255-4490
  Main:        204-255-4136
  Fax:         204-942-6705




                                                            Copyright 2007 – Seccuris Inc.

More Related Content

What's hot

Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Craig Martin
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture DesignPriyanka Aash
 
Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015Bill Ross
 
SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSAcourses
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...PECB
 
Compliance to Enablement - SABSA & GDPR
Compliance to Enablement - SABSA & GDPRCompliance to Enablement - SABSA & GDPR
Compliance to Enablement - SABSA & GDPRSABSAcourses
 
Adaptive Enterprise Security Architecture
Adaptive Enterprise Security ArchitectureAdaptive Enterprise Security Architecture
Adaptive Enterprise Security ArchitectureSABSAcourses
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEryk Budi Pratama
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 

What's hot (20)

Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
SABSA overview
SABSA overviewSABSA overview
SABSA overview
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
 
Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015
 
SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summary
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
Security review using SABSA
Security review using SABSASecurity review using SABSA
Security review using SABSA
 
SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part IV)_ver1-0SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part IV)_ver1-0
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
SABSA white paper
SABSA white paperSABSA white paper
SABSA white paper
 
Compliance to Enablement - SABSA & GDPR
Compliance to Enablement - SABSA & GDPRCompliance to Enablement - SABSA & GDPR
Compliance to Enablement - SABSA & GDPR
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Adaptive Enterprise Security Architecture
Adaptive Enterprise Security ArchitectureAdaptive Enterprise Security Architecture
Adaptive Enterprise Security Architecture
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 

Similar to Information Security Architecture: Building Security Into Your Organziation

Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT SecuritySeccuris Inc.
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
Prolifics at IBM Lotusphere 2012
Prolifics at IBM Lotusphere 2012Prolifics at IBM Lotusphere 2012
Prolifics at IBM Lotusphere 2012Prolifics
 
Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3techcouncil
 
Zd sap - predictive analytics - 3-26-13 r1
Zd   sap - predictive analytics - 3-26-13 r1Zd   sap - predictive analytics - 3-26-13 r1
Zd sap - predictive analytics - 3-26-13 r1Richard Lee
 
Rule Imc Records Management & Discovery Offering Q109 V2
Rule Imc Records Management & Discovery Offering Q109 V2Rule Imc Records Management & Discovery Offering Q109 V2
Rule Imc Records Management & Discovery Offering Q109 V2mikelines
 
Missouri Issues in Workers’ Compensation General Session
Missouri Issues in Workers’ Compensation General SessionMissouri Issues in Workers’ Compensation General Session
Missouri Issues in Workers’ Compensation General SessionKurt Madel
 
VAPT Services | Securium Solutions
VAPT Services | Securium SolutionsVAPT Services | Securium Solutions
VAPT Services | Securium SolutionsSecurium solutions
 
ITS 1 Page Overview
ITS 1 Page OverviewITS 1 Page Overview
ITS 1 Page OverviewITS Partners
 
Safewall - Staying ahead of the threat
Safewall - Staying ahead of the threatSafewall - Staying ahead of the threat
Safewall - Staying ahead of the threatVincent Kwon
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?PECB
 
Company Profile Zindagi Technologies
Company Profile Zindagi TechnologiesCompany Profile Zindagi Technologies
Company Profile Zindagi TechnologiesZindagitechnologies
 
Houston Baptist University Student Marketing Presentation 0409
Houston Baptist University Student Marketing Presentation 0409Houston Baptist University Student Marketing Presentation 0409
Houston Baptist University Student Marketing Presentation 0409Jonathan_Fisher
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Enterprise Management Associates
 
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions
 
SECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security CompanySECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security Companykeshavsecurium
 
Best Vapt Security Company Securium Solu
Best Vapt Security Company Securium SoluBest Vapt Security Company Securium Solu
Best Vapt Security Company Securium Solukeshavsecurium
 
Procon Expert Statement2010
Procon Expert Statement2010Procon Expert Statement2010
Procon Expert Statement2010jmreiner
 

Similar to Information Security Architecture: Building Security Into Your Organziation (20)

Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT Security
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Prolifics at IBM Lotusphere 2012
Prolifics at IBM Lotusphere 2012Prolifics at IBM Lotusphere 2012
Prolifics at IBM Lotusphere 2012
 
Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3
 
Zd sap - predictive analytics - 3-26-13 r1
Zd   sap - predictive analytics - 3-26-13 r1Zd   sap - predictive analytics - 3-26-13 r1
Zd sap - predictive analytics - 3-26-13 r1
 
Rule Imc Records Management & Discovery Offering Q109 V2
Rule Imc Records Management & Discovery Offering Q109 V2Rule Imc Records Management & Discovery Offering Q109 V2
Rule Imc Records Management & Discovery Offering Q109 V2
 
Missouri Issues in Workers’ Compensation General Session
Missouri Issues in Workers’ Compensation General SessionMissouri Issues in Workers’ Compensation General Session
Missouri Issues in Workers’ Compensation General Session
 
VAPT Services | Securium Solutions
VAPT Services | Securium SolutionsVAPT Services | Securium Solutions
VAPT Services | Securium Solutions
 
ITS 1 Page Overview
ITS 1 Page OverviewITS 1 Page Overview
ITS 1 Page Overview
 
Safewall - Staying ahead of the threat
Safewall - Staying ahead of the threatSafewall - Staying ahead of the threat
Safewall - Staying ahead of the threat
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
Business Process Management 1 Developing The Skillset
Business Process Management 1 Developing The SkillsetBusiness Process Management 1 Developing The Skillset
Business Process Management 1 Developing The Skillset
 
Company Profile Zindagi Technologies
Company Profile Zindagi TechnologiesCompany Profile Zindagi Technologies
Company Profile Zindagi Technologies
 
Houston Baptist University Student Marketing Presentation 0409
Houston Baptist University Student Marketing Presentation 0409Houston Baptist University Student Marketing Presentation 0409
Houston Baptist University Student Marketing Presentation 0409
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
 
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
 
Securim Solutions Pvt Ltd
Securim Solutions Pvt LtdSecurim Solutions Pvt Ltd
Securim Solutions Pvt Ltd
 
SECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security CompanySECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security Company
 
Best Vapt Security Company Securium Solu
Best Vapt Security Company Securium SoluBest Vapt Security Company Securium Solu
Best Vapt Security Company Securium Solu
 
Procon Expert Statement2010
Procon Expert Statement2010Procon Expert Statement2010
Procon Expert Statement2010
 

More from Seccuris Inc.

Building an enterprise forensics response service
Building an enterprise forensics response serviceBuilding an enterprise forensics response service
Building an enterprise forensics response serviceSeccuris Inc.
 
Digital Anti-Forensics: Emerging trends in data transformation techniques
Digital Anti-Forensics: Emerging trends in data transformation techniquesDigital Anti-Forensics: Emerging trends in data transformation techniques
Digital Anti-Forensics: Emerging trends in data transformation techniquesSeccuris Inc.
 
Compliance in Virtualized Environments
Compliance in Virtualized EnvironmentsCompliance in Virtualized Environments
Compliance in Virtualized EnvironmentsSeccuris Inc.
 
Outsourcing: A Security Perspective
Outsourcing: A Security PerspectiveOutsourcing: A Security Perspective
Outsourcing: A Security PerspectiveSeccuris Inc.
 
Security Information Management: An introduction
Security Information Management: An introductionSecurity Information Management: An introduction
Security Information Management: An introductionSeccuris Inc.
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionSeccuris Inc.
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Building Critical Infrastructure For Business Recovery
Building Critical Infrastructure For Business RecoveryBuilding Critical Infrastructure For Business Recovery
Building Critical Infrastructure For Business RecoverySeccuris Inc.
 
Virtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationVirtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationSeccuris Inc.
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security ProgramSeccuris Inc.
 

More from Seccuris Inc. (10)

Building an enterprise forensics response service
Building an enterprise forensics response serviceBuilding an enterprise forensics response service
Building an enterprise forensics response service
 
Digital Anti-Forensics: Emerging trends in data transformation techniques
Digital Anti-Forensics: Emerging trends in data transformation techniquesDigital Anti-Forensics: Emerging trends in data transformation techniques
Digital Anti-Forensics: Emerging trends in data transformation techniques
 
Compliance in Virtualized Environments
Compliance in Virtualized EnvironmentsCompliance in Virtualized Environments
Compliance in Virtualized Environments
 
Outsourcing: A Security Perspective
Outsourcing: A Security PerspectiveOutsourcing: A Security Perspective
Outsourcing: A Security Perspective
 
Security Information Management: An introduction
Security Information Management: An introductionSecurity Information Management: An introduction
Security Information Management: An introduction
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and prevention
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Building Critical Infrastructure For Business Recovery
Building Critical Infrastructure For Business RecoveryBuilding Critical Infrastructure For Business Recovery
Building Critical Infrastructure For Business Recovery
 
Virtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationVirtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualization
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security Program
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Information Security Architecture: Building Security Into Your Organziation

  • 1. Information Security Architecture Building Security into your Organization
  • 2. The on-going promotion of security… • Increasing threats • Complex Vulnerabilities • Large, intricate solutions required Copyright 2007 – Seccuris Inc.
  • 3. We‘re sucked into acting on generic justifications! After implementing large, intricate solutions we have: • Increased our workload • Impacted productivity and innovation in the environment Copyright 2007 – Seccuris Inc.
  • 4. The internal challenge… What do we hear most from IT & IT Security Departments regarding support? • We are under resourced • We are fighting a loosing battle • The “business” is making our jobs harder We are misaligned with the business! Copyright 2007 – Seccuris Inc.
  • 5. Copyright 2007 – Seccuris Inc.
  • 6. Our key issue… We are using Security to undermine the business • How many organizations business is information security? • Not Many. • Information Security enables the business to operate effectively with a properly managed (balanced) risk profile. Copyright 2007 – Seccuris Inc.
  • 7. Our key issue… We are using Security to undermine the business • How many organizations business need information security? Copyright 2007 – Seccuris Inc.
  • 8. Our key issue… Every business requires Trust & Relationships • Information Security ensures: • Trust is maintained appropriately for the level of risk • Relationships are protected and “assured” (AIC) Copyright 2007 – Seccuris Inc.
  • 9. Our key issue… • Implementing solutions without understanding Trust requirements impacts: • Productivity • Innovation • Flexibility Copyright 2007 – Seccuris Inc.
  • 10. Why are we undermining the business? Current approach to security solutions undermine: business productivity benefits of new technologies Copyright 2007 – Seccuris Inc.
  • 11. Undermining the Business We implement solutions that focus on security, not on business Prevent systems to interface other systems FW, IDS/IPS Solutions Restrict user abilities within the application Application & Database controls Authorize access to information systems & services Web filtering / Instant Messaging Control / SSL VPN Copyright 2007 – Seccuris Inc.
  • 12. Undermining the Business We build unnecessary conflict into our projects and environment • Being on the “Same Team” is seen as a conflict • Why is being on the “Same Team” an issue? • Who is really accepting the risk? Copyright 2007 – Seccuris Inc.
  • 13. Undermining the Business We implement solutions without Justification, Prioritization & Completeness Lacking processes such as: • Business Requirements for Information Sharing • Privacy and Security Requirements Definition • Solution Design Reviews • Environment Validation & Health Checks • Incident Handling & Forensic Investigation • Business Risk acceptance for implemented solutions Copyright 2007 – Seccuris Inc.
  • 14. Undermining the Business We implement solutions without Justification, Prioritization & Completeness Lacking processes such as: • Business Requirements for Information Sharing • Privacy and Security Requirements Definition • Solution Design Reviews • Environment Validation & Health Checks • Incident Handling & Forensic Investigation • Business Risk acceptance for implemented solutions Copyright 2007 – Seccuris Inc.
  • 15. Undermining the Business Are we undermining the benefits of new technologies? • Enterprise Storage & Backup Solutions • Remote Access • VOIP • Virtualization Copyright 2007 – Seccuris Inc.
  • 16. Improving enablement of the business An Information Security Framework aligns controls and solutions enabling business objectives AND US! Copyright 2007 – Seccuris Inc.
  • 17. SABSA: Enterprise Security Framework Focuses on: • Establishing Business Context • Developing a Business Risk Model • Developing a Conceptual Trust Model • Developing a Security Domain Model • Understanding business priorities, environment gaps and key strategies to move forward Copyright 2007 – Seccuris Inc.
  • 18. SABSA: Enterprise Security Framework Focuses on: • Establishing Business Context • Developing a Business Risk Model • Developing a Conceptual Trust Model • Developing a Security Domain Model • Understanding business priorities, environment gaps and key strategies to move forward Copyright 2007 – Seccuris Inc.
  • 19. Developing a Conceptual Trust Model To secure the organization: • Identify entities involved with the organization • Define information flowing between business entities • Assess the assurance required to establish trust Copyright 2007 – Seccuris Inc.
  • 20. Developing a Conceptual Trust Model Copyright 2007 – Seccuris Inc.
  • 21. Developing a Conceptual Trust Model SABSA – Example Trust Model 5. Partner Organizations 5a. Partner 1 5b. Partner 2 TH9. Financial, Client Personal, TH10. Financial, Client Personal, Business Confidential Business Confidential Information Information 6. Our Organization 7. Executive Management 1. Clients 8. General 4. Integrated Suppliers/ TH1. Financial. Personal, Management 7a. Board Executive Partners TH8. Intellectual Property, Health Financial, Employee / Client Personal, Information Employee / Client Personal Health 1a. Target Clients Information 4a. 4 Outsourced Delivery (IT) 9. Organizational Units TH2. Client Confidential TH7 Intellectual Property, 1b. Industry Information 9a. Business 9b. Service Financial, Employee / Client Personal, 4b. Outsourced Partners Employee / Client Personal Health Administration Delivery Delivery Information, Compliance (Business/Program) Audits, 10. Independent Sales TH3. Financial, Performance 11. Sales Agencies Status Information Offices TH4. Public Information 2. Other Stakeholders TH6. Intellectual TH5. Compliance Property Audits, 2a. Industry Groups 2b. Media Sensitive Information 3. General Suppliers 3c. External 3a. Vendors & 3b. Suppliers Regulators Contractors (e.g. PCI) Copyright 2007 – Seccuris Inc.
  • 22. Conceptual Trust Model: Define Information Sharing Financial, Personal & Health Information Intellectual Property, Financial Information, Audit Reports Copyright 2007 – Seccuris Inc.
  • 23. Conceptual Trust Model: Define Trust Requirements Our organization provides services to our clients that must remain confidential from other internal business units / employees, as well as external entities. Copyright 2007 – Seccuris Inc.
  • 24. Conceptual Trust Model: Define Trust Requirements Clients provide confidential personal, financial and health information that must remain confidential from other internal entities, as well as external entities. i.e. Payment Card Information Copyright 2007 – Seccuris Inc.
  • 25. Conceptual Trust Model: Define Trust Requirements Our organization shares intellectual property relevant to the business services provided as well as Financial, Personal and Health information regarding our employees and our clients that must remain confidential from non-involved internal entities, as well as non-involved (contractually bound) external entities. Copyright 2007 – Seccuris Inc.
  • 26. Conceptual Trust Model: Define Trust Requirements Integrated Suppliers share intellectual property relevant to the business services provided as well as Financial, Personal and Health information regarding our employees and clients that must remain confidential from our clients (direct), non-involved internal entities, as well as external entities. Copyright 2007 – Seccuris Inc.
  • 27. Developing a Security Domain Model The security domain model defines three major elements: 1. Structure and scope of the security domains within the Organization 2. Interrelationships to external security domains 3. Who is the Authority for the Domain Copyright 2007 – Seccuris Inc.
  • 28. Developing a Security Domain Model D1. Our Organization D3. Executive Management D3a. Board D2. Organizational Units Executive D3a. Business D4. General D3b. Program D2a. Business DR1 D12. Clients Enablement D3b. Program Management Services Enablement s D2a. Business D2b. Service Services Services Services Administration General Delivery D16. Suppliers DR2 DR7 D5. Independent Sales Offices DR3 D11. General General Suppliers Suppliers D6. Sales Agencies DR4 DR6 ASD DR5 (IT) ASD D10. Integrated (IT) Suppliers ASD (Business) (IT) ASD Other D9. Integrated (IT) Other Governments Suppliers D7. Partner Governments (IT) Organizations D8. Other Stakeholders Copyright 2007 – Seccuris Inc.
  • 29. Developing a Security Domain Model D1. Our Organization D2. Organizational Units D3a. Business D3b. D3b Program D2a. D2a Business DR1 D12. Clients Enablement D3b. Program Services Enablement s D2a. Business D2b. Service Services Services Services Administration General Delivery D16. DR3 Suppliers ASD (IT) ASD D10. Integrated (IT) Suppliers (Business) Copyright 2007 – Seccuris Inc.
  • 30. Security Domain Model: Authority & Scope Domain Authority: Our CIO Our organization encompasses all management (executive and general), Organizational Units and Sales (Independent and Agency) entities owned and legally controlled by our organization. Copyright 2007 – Seccuris Inc.
  • 31. Security Domain Model: Authority & Scope Domain Authority: Org Unit President Organizational Units encompass the specific Business Administration and Service Delivery Functions for each unique OU entity. (Including IT Services & Functions) Copyright 2007 – Seccuris Inc.
  • 32. Security Domain Model: Authority & Scope Domain Authority: Integrated Supplier Integrated Suppliers (Business) encompass any specific external entity controlling one or many smaller entities that provide outsourced business functions to any specific Organizational Unit. Copyright 2007 – Seccuris Inc.
  • 33. Security Domain Model: Authority & Scope Domain Authority: Client (Individual) Clients encompass both specific target clients as well as industry partners relevant to our organizations service offerings. Copyright 2007 – Seccuris Inc.
  • 34. Using Trust & Relationships The tools we have used: • Entity Diagram Relationships • Trust Relationship Diagram Trust • Security Domain Diagram Authorities • Boundary Control Inventory Copyright 2007 – Seccuris Inc.
  • 35. Defining Boundary Controls DR# Boundary Description Boundary Controls DR3 Our Organization interacting with Organizational •Contracts/Agreements Integrated Suppliers (Business) •Service Level Agreement •Internal Policy (InfoSec) •Industry Compliance Requirements •Legislation, regulations, and acts Technical •Firewall / ACLs •Segmented VLANs for Supplier •Intrusion Prevention Systems (NIDS) •Intrusion Prevention Systems (HIDS) Copyright 2007 – Seccuris Inc.
  • 36. Defining Boundary Controls DR# Boundary Description Boundary Controls DR1 Our Organization interacting with Organizational •Contracts/Agreements Clients •Internal Policy (InfoSec) •Legislation, regulations, and acts Technical •Firewall / ACLs •Intrusion Prevention Systems (NIDS) •User Account Roles (Web SVC) Copyright 2007 – Seccuris Inc.
  • 37. Defining Boundary Controls Review defined boundary controls: • What relationships have the most complex control requirements? Prioritization • What relationships lack controls? Completeness • How many boundaries share common controls? Justification Copyright 2007 – Seccuris Inc.
  • 38. Improving your Security Program How do you use Trust and Security Domain Models to improve your Information Security posture? What should we think about when implementing: • IDS / IPS • Database Security • Web filtering / Instant Messaging Control / SSL VPN Copyright 2007 – Seccuris Inc.
  • 39. Defend your boundaries • Focus on Automated Policy Enforcement on clearly understood boundaries where information sharing requirements are well defined. • Free resources to focus on higher level business risks • Restrictive Firewalls / IPS / UTM / Content Filtering Copyright 2007 – Seccuris Inc.
  • 40. Defend your boundaries D1. Our Organization D3. Executive Management D3a. Board D2. Organizational Units Executive D3a. Business D4. General D3b. Program D2a. Business DR1 D12. Clients Enablement D3b. Program Management Services Enablement s D2a. Business D2b. Service Services Services Services Administration General Delivery D16. Suppliers DR2 DR7 D5. Independent DR3 Sales Offices D11. General General Suppliers Suppliers D6. Sales Agencies DR4 DR6 ASD DR5 (IT) ASD D10. Integrated (IT) Suppliers ASD (Business) (IT) ASD Other D9. Integrated (IT) Other Governments Suppliers D7. Partner Governments (IT) Organizations D8. Other Stakeholders Copyright 2007 – Seccuris Inc.
  • 41. Protect your core • Focus verbose detective tools within boundaries to allow for business focused investigation to occur • Generic DB attack from the outside world • Automated Block – Move on • Generic DB attack from the inside world • Review Block – Monitor / Investigate / Respond • IDS/IPS / Database Security Controls / Investigative Process Copyright 2007 – Seccuris Inc.
  • 42. Protect your core Copyright 2007 – Seccuris Inc.
  • 43. Enable your business Build strategies that align with Trust and Information Sharing requirements • Using Trust Modeling and Security Domains we clearly know: • What is at stake • To what level we must protect the relationship and information • Who decides what risk level is acceptable • Who accepts the residual risk Copyright 2007 – Seccuris Inc.
  • 44. Enable your business with an Information Security Framework • Improve visibility to security boundaries and identify Trust issues • Free to focus on building new solutions enabling information sharing • Demonstrates linkages between the business and chosen strategy & solutions • Prioritizes implementation of controls Copyright 2007 – Seccuris Inc.
  • 45. Conclusion We can implement solutions with Justification, Prioritization & Completeness Seccuris will assist with: • Strategy & Framework •Process Development • Solution Creation & Validation • Implementation • Monitoring & Response Copyright 2007 – Seccuris Inc.
  • 46. Thanks Michael Legary, CSA, CISSP, CISM, CISA, CCSA, CPP, GCIH, PCI-QSA Founder & CIO Seccuris Inc. Email: Michael.Legary@seccuris.com Direct: 204-255-4490 Main: 204-255-4136 Fax: 204-942-6705 Copyright 2007 – Seccuris Inc.