SlideShare ist ein Scribd-Unternehmen logo
1 von 74
Enterprise Security Architecture
Arnab Chattopadhayay
Vice President, Engineering
Infoworks Inc.
Enterprise Architecture
• A field born about 30 years ago
• Initially targeted to address two problems
– System complexity
– Inadequate business alignment
– Resulting into
• More Cost, Less Value
Enterprise Architectural Methodologies
• Consortia-developed Frameworks
– ISO 19439
– RM-ODP (ITU-T X.901-904)
– TOGAF
• Defense Industry Framework
– DoDAF
– MODAF
– NAF
• Government Framework
– ESAAF
– FEAF
– NIST Enterprise Architecture Model
• Open Source Frameworks
– TRAK
– SABSA
• Proprietary Frameworks
• Zachman Frameworks
• IAF (Capgemini, 1993)
A Brief History of Enterprise Architecture
Zachman’s first article
1987
TAFIM released
1994
Clinger-Cohen bill passed
1996 1998
TAFIM retired
FEAF 1.2 released
1999 2002
FEA replaces FEAF
TOGAF EE 8.0 released
2003 2003
FEA mostly complete
2011
TOGAF 9.1
Zachman Framework (1)
• The Zachman "Framework" is actually a taxonomy for organizing
architectural artifacts (in other words, design documents, specifications,
and models) that takes into account both who the artifact targets (e.g.
business owner and builder) and what particular issue (e.g. data and
functionality) is being addressed
• Two dimensions
– Players in the game
– Architectural Artifacts
• Players in the game: Actors
• Architectural Artifacts: the What, How, Where, When, Who and Why
• The second dimension is independent of the first
– Both the Builder and the Owner need to know the ‘What’
– But, they need to know different ‘What’
• From a Business Owner’s perspective, ‘Data’ means business entity
– Example: Customer, Product, Demographic Groups, Inventory
• From the developer’s perspective i.e. Builder’s perspective, ‘Data’ means
rows and columns organized into table, mathematical joins to implement
relationships
Zachman Framework (2)
• Zachman Framework is typically depicted as a 6 x 6 matrix
– Columns: Communication Interrogatives
– Rows: Reification Transformation
– The Framework Classification is represented by 36 cells
– Each cell represents a player’s perspective (e.g. business owner) and a
descriptive focus (e.g. data)
• Moving horizontally changes description of the system from
same player’s perspective
• Moving vertically pin down to single focus but changes players
Zachman Framework (4)
Source: zachmaninternational.com
[Executive Mgmt
Perspective]
[Business Mgmt
Perspective]
[Architect’s
Perspective]
[Engineer’s
Perspective]
[Technician’s
Perspective]
How Zachman Taxonomy can help building a system
architecture
• First: use Zachman Taxonomy to the fact that every
architecture artifact must live in one and only one cell
• Second: achieve architectural completeness by completing
every cell
• Third: cells in columns should be related to each other.
Five Ways Zachman Taxonomy can help building
enterprise architecture
• Five ways Zachman Taxonomy can help:
– Ensure that every stakeholder's perspective has been
considered for every descriptive focal point
– Improve the Enterprise Architecture artifacts themselves
by sharpening each of their focus points to one particular
concern for one particular audience
– Ensure that all of CxO’s business requirements can be
traced down to some technical implementation
– Convince Business function of the organization that the
technical team isn't planning on building a bunch of
useless functionality
– Convince Technology team that the business folks are
including IT teams in their planning
What Zachman Taxonomy does not
provide
• Does not provide step-by-step process to create new
architecture
• Does not provide much help in validating an
architecture
• Does not provide help in deciding future architecture
Cyber Security Frameworks
• A Cyber Security Framework is a risk-based
compilation of guidelines designed to help
organizations assess current capabilities and
draft a prioritized roadmap toward
improved cybersecurity practices
Source: NIST
Well Known Cyber Security
Frameworks
• ISO/IEC 27001 & 27002 (formerly ISO 17799)
• NIST SP 800-53: Security and Privacy Controls
for Federal Information Systems and
Organizations
• Sherwood Applied Business Security
Architecture (SABSA)
• NIST SP 800-39: Risk Management Framework
• Security in Major IT Management Frameworks
What is SABSA
• Methodology for:
– Developing business-driven, risk and opportunity focused enterprise
security & information assurance architectures
– Delivering security infrastructure & service management solutions
that traceably support critical business initiatives
• Comprised of a number of integrated frameworks, models, methods and
processes, including:
– Business Requirements Engineering Framework (also known as
Attributes Profiling)
– Risk & Opportunity Management Framework
– Policy Architecture Framework
– Security Services-Oriented Architecture Framework
– Governance Framework
– Security Domain Framework
– Through-life Security Service & Performance Management
Features and Advantages
Feature Advantage
Business Driven Value-assured
Risk Focused Prioritized and proportional responses
Comprehensive Scalable scope
Modular Agility – ease of implementation and
management
Open Source (protected) Free use, open source global standard
Auditable Demonstrate compliance
Transparent Two-way traceability
©SABSA Foundation 2010
How is SABSA Used
• Information Assurance
• Governance, Compliance & Audit
• Policy Architecture
• Security service management
• IT Service management
• Security performance
management, measures &
metrics
• Service performance
management, measures &
metrics
• Over-arching decision-making
framework for end-to-end
solutions
• Enterprise Security Architecture
• Enterprise Architecture
• Individual solutions-based
Architectures
• Seamless security integration &
alignment with other frameworks
(including TOGAF, ITIL, ISO27000
series, Zachman, DoDAF, CobIT,
NIST, etc.)
• Filling the security architecture
and security service management
gaps in other frameworks
• Business requirements
engineering
• Solutions traceability
• Risk & Opportunity Management
Sherwood Applied Business Security Architecture
(SABSA) Model
SABSA Model
The SABSA Model comprises six layers. It is based on the well-known Zachman framework1
for developing
model for enterprise architecture, although it has been adapted somewhat to a security view of the world.
SABSA Model
• Comprises of six layers
• Based on Zachman framework/taxonomy
• The Security Service Management Architecture has been
placed vertically across the other five layers
– Security management issues arises in every horizontal layer
• Each horizontal layers are made of a series of vertical
communication interrogatives
– What (Assets)
– Why (Motivation)
– How (Process and Technology)
– Who (People)
– Where (Location)
– When (Time)
©SABSA foundation, 2010
Logical
Process Maps
& Services
Domain Maps
Entity & Trust
Framework
Calendar &
Timetable
Physical
ICT
Infrastructure
Human
Interface
Processing
Schedule
Component
Locator
Tools &
Standards
Personnel
Management
Tools & Standards
Step Timing
& Sequencing
Tools
Service
Management
Service
Delivery
Management
Process
Delivery
Management
Management of
Environment
Personnel
Management
Time &
Performance
Management
Information
Assets
Data
Assets
ICT
Components
Process
Mechanisms
Process Tools
& Standards
Assets
(What)
Process
(How)
Location
(Where)
People
(Who)
Time
(When)
Contextual
Business
Decisions
Business
Processes
Business
Geography
Business
Governance
Business
Time
Dependence
Conceptual
Business
Knowledge &
Risk Strategy
Strategies for
Process
Assurance
Domain
Framework
Roles &
Responsibilities
Time
Management
Framework
Motivation
(Why)
Business
Risk
Risk
Management
Objectives
Risk
Management
Policies
Risk
Management
Practices
Risk Management
Tools &
Standards
Operational
Risk
Management
SABSA Matrix
SABSA Lifecycle
Business View Contextual Architecture
Architect’s View Conceptual Architecture
Designer’s View Logical Architecture
Builder’s View Physical Architecture
Tradesman’s View Component Architecture
Service Manager’s View Operational Architecture
SABSA Mapping with other Security Standards
Applications
Presentation
Session
Transport
Network
Link
Physical
Applications
Presentation
Session
Transport
Network
Link
Physical
ISO 7498-1 ISO 7498-2
Logical
Security
Services
Physical
Security
Mechanisms
Contextual Architecture
Conceptual Architecture
Business
Driven
Requirements
& Strategy
SABSA Views
Logical Architecture
Physical Architecture
Component Architecture
Operational Architecture Service
Management
Detailed
Custom
Specification
Bringing All Together
BusinessStrategy
Goals
Relatio
nship
Market
Regula
tion
People
Materi
als
Financ
e
Produc
tion
Logisti
cs
BAP
Risk
Model
Trust
Model
SecurityStrategy
Process
Design
Policy & Legal
Framework
Technical
Design
LogicalSecurityServices
Confidentiality
Identification
Registration
Certification
Directories
Authentication
Authorization
Access Control
Audit Trail
PhysicalSecurityMechanism
Encryption
Naming
Procedures
Signatures
Databases
Passwords
ACLs
Firewalls
Event Logs
Components
TrustedBusinessOperations
ProductsTools
Using SABSA
Define
Contextual
Security
Architecture
Define
Conceptual
Security
Architecture
Define Logical
Security
Architecture
Define
Physical
Security
Architecture
Define
Component
Security
Architecture
Define Operational Security Architecture
Approach of Discussing SABSA
• Business Context and Requirements
• Policy Architecture
• Architecture Strategies
• Planning and Performance Management
• Scope of current discussion
– Business context and requirements
– Architecture strategies
– Planning and performance management
• They would be discussed in terms of framework
and implementation
BUSINESS CONTEXT AND
REQUIREMENTS
Framework
Scope: Strategy & Planning Phase -
Assets
Scope: Strategy & Planning Phase -
Assets
Business Driver Development
BAP with KPI’s and KRI’s
Business Driven Architecture
• Being business-driven means never losing site of the
organisation’s goals, objectives, success factors and
targets, and ensuring that the security strategy
demonstrably supports, enhances and protects them
• The contextual architecture captures and presents the
full set of relevant requirements for the scope of the
assignment
– Including conflicts in business strategy, risks & priorities
– At this stage we are confirming that they are complete and
we understand them
– The conceptual layer will later resolve these conflicts by
delivering an appropriate, measurable security strategy
Credible Abstraction is Key
• Meaningful traceability is enabled by credible abstraction from business context
(assets, goals & objectives) to a business security context
• Traceability therefore starts by delivering two slightly different sets of
requirements:
Business Attributes
• An Attribute is a conceptual abstraction of a real
business requirement (the goals, objectives,
drivers, targets, and assets confirmed as part of
the business contextual architecture)
• The Attributes Profiling technique enables any
unique set of business requirements to be
engineered as a standardized and re-usable set
of specifications
• The Attributes are modeled into a normalized
language that articulates requirements and
measures performance in a way that is
instinctive to all stakeholders
Attributes Profiling Rules & Features
• Attributes can be tangible or intangible
• Each attribute requires a meaningful name and detailed definition
customized specifically for a particular organization
• Each attribute requires a measurement approach and metric to be
defined during the SABSA Strategy & Planning phase to set
performance targets for security
• Attributes must be validated (and preferably created) by senior
management & the business stake-holders by report, interview or
facilitated workshop
• The performance targets are then used as the basis for reporting
and/or SLAs in the SABSA Manage & Measure phase
• Powerful requirements engineering technique
• Populates the vital ‘missing link’ between business requirements
and technology / process design
Two-way Traceability – Drivers to
Attributes
Two-way Traceability – Attributes to
Drivers
Sample of Business Drivers
Driver # Business Drivers
BD1
Protecting the reputation of the Organization, ensuring that it is perceived as
competent in its sector
BD2
Providing support to the claims made by the Organization about its competence
to carry out its intended functions
BD3
Protecting the trust that exists in business relationships and propagating that
trust across remote electronic business communications links and distributed
information systems
BD4
Maintaining the confidence of other key parties in their relationships with the
Organization
BD5 Maintaining the operational capability of the Organization’s systems
BD6
Maintaining the continuity of service delivery, including the ability to meet the
requirements of service level agreements where these exist
BD7 Maintaining the accuracy of information
BD8 Maintaining the ability to govern
BUSINESS CONTEXT AND
REQUIREMENTS
Implementation Approach
Business Attributes
Business
Attributes
User Attributes
Management
Attributes
Risk
Management
Attributes
Legal/Regulatory
Attributes
Technical
Strategy
Attributes
Operational
Attributes
Business
Strategy
Attributes
Business
Attribute Business Attribute Definition Suggested Measurement Approach Metric Type
User Attributes
Accessible Information to which the user is entitled to gain access
should be easily found and accessed by that user.
Search tree depth necessary to find the information
Soft
Accurate
The information provided to users should be accurate
within a range that has been preagreed upon as being
applicable to the service being delivered.
Acceptance testing on key data to demonstrate
compliance with design rules Hard
Anonymous
For certain specialized types of service, the anonymity
of the user should be protected.
Rigorous proof of system functionality
Red team review
Hard
Soft
Consistent
The way in which log-in, navigation, and target services
are presented to the user should be consistent across
different times, locations, and channels of access.
Conformance with design style guides Red team review
Soft
Current
Information provided to users should be current and
kept up to date, within a range that has been pre-
agreed upon as being applicable for the service being
delivered.
Refresh rates at the data source and replication of
source and replication of refreshed data to the
destination.
Hard
Attribute Profile
Business
Attributes
User Attributes
Management
Attributes
Risk
Management
Attributes
Legal/Regulatory
Attributes
Technical
Strategy
Attributes
Operational
Attributes
Business
Strategy
Attributes
Business
Attribute
Business
Driver Business Attribute Definition Measurement Approach Metric
Performance
Target
User Attributes
Accessible 5
Information to which the user is entitled to gain
access should be easily found and accessed by that
user.
Search tree depth necessary to find the
information
Soft
Accurate 7
The information provided to users should be accurate
within a range that has been preagreed upon as
being applicable to the service being delivered.
Acceptance testing on key data to
demonstrate compliance with design rules Hard
Anonymous 4
For certain specialized types of service, the
anonymity of the user should be protected.
Rigorous proof of system functionality
Red team review
Hard
Soft
Consistent 23, 41
The way in which log-in, navigation, and target
services are presented to the user should be
consistent across different times, locations, and
channels of access.
Conformance with design style guides
Red team review
Soft
Current 7
Information provided to users should be current and
kept up to date, within a range that has been
preagreed upon as being applicable for the service
being delivered.
Refresh rates at the data source and
replication of source and replication of
refreshed data to the destination.
Hard
ARCHITECTURAL STRATEGIES
Scope: Strategy & Planning Phase -
Process
Alignment, Integration & Compliance Strategy
• Understand what needs to be aligned, to what
purpose, and where it is positioned within the SABSA
framework
• Business model or business process framework
• Legislation, regulation or governance frameworks
• Risk management methods, assurance framework or
audit approach
• IT Architecture framework or method
• Controls framework, library or standard
• Performance management & reporting framework
Strategy & Planning Phase Alignment
Risk Management Method Alignment
Performance & Reporting Methods
Control Objectives Libraries &
Standards
Controls Frameworks & Libraries
SABSA Multi-tiered Control Strategy
Application of Multi-tiered Controls In Risk
• The multi-tiered controls strategy is modeled against
the risk assessment to determine proportional and
appropriate response
• Contributes to selection of the right control in the right
place at the right time
• Enables further removal of subjectivity in selection of
Risk Treatments
• Facilitates construction of databases and risk
management tools that respond to definitive risk
scenarios with definitive control decisions
• Increases speed and ease of use of Risk Assessment
Application of SABSA Multi-tier Control
Application of Multi-tiered Control Strategy
PLANNING & PERFORMANCE
MANAGEMENT CONCEPTS
Scope: Strategy & Planning Phase -
Time
Architecture Strategy & Planning Phase
Architecture Design Phase
Implementation Phase & Approach
• Implementation is an important part of the lifecycle but the
SABSA Matrix does not define a specific implementation
layer
– No need to re-invent Prince2 or PMI etc.
• Notoriously difficult to gain business support and budget
for pure infrastructure projects
• Rare that a major strategic enterprise-wide security
architecture is implemented as a single project
• More likely (and more sensible) is that the architecture
provides a blue-print and a road-map that guides a whole
series of separate implementation projects, each of which
is driven by a specific business initiative and funded by a
budget associated with that initiative
Manage & Measure Phase – Lifecycle Overlay
• SABSA Architecture traceably abstracts from pure
Business Context to:
– Pure technical deployment in the Component layer
– Pure management in the Service Management layer
• The Service Management layer defines all aspects
of security management and constructs the
means to manage and incorporate change by
being presented vertically across the other layers:
– Strategy (Context & Concept Layers)
– Tactics (Logical, Physical, & Component Layers)
– Operations (Security Service Management Matrix)
Manage & Measure Phase – SSM Matrix
SABSA Development Process
SABSA Risk Management Process Overview
Risk Management and the SABSA Matrix
SABSA Lifecycle Domain Risk Perspectives
Process Improvement Framework –
SABSA Maturity Profile (SMP)
• Coordinates SABSA process information from all parts of the business
– Demonstrates due diligence to senior management, auditors and regulators
• Based on Capability Maturity Modeling (CMM) concepts
– Qualitative measurement technique for maturity of processes
– Six domains mapped onto the SABSA Matrix
– Consistent, objective 5-point maturity scale
• Identifies, measures and reports compliance practices
– Against the SABSA framework, model and processes
– Provides a gap analysis to drive a SABSA improvement programme
• Can be implemented through a web-enabled tool for
– Ease of use, wide involvement, quick responses
• Regular use tracks progress and measures changes
– Benchmarking against target maturity
SABSA Maturity Profile Process Areas
SMP Process Areas and SMP Process Activities
• Each of the six SMP domains is decomposed into
six SMP Process Areas
• These SMP Process Areas map onto the six cells
of the row of the SABSA
• Matrix corresponding to the particular SMP
domain
• The SMP Process Activities are then derived by
overlaying the SABSA
• Service Management Matrix onto the SMP
Process Areas
SMP Maturity Levels
SMP Generic Practices
Performance Management Framework
Defining Business-driven Performance Targets
Architecture Measurement Categories
• Completeness
– Do we have all of the
components?
– Do they form an integrated
system?
• Assurance
– Does the system run
smoothly?
– Are we assured that it is
properly assembled?
– Is the system fit-for-purpose?
• Compliance
– Do we maintain the system?
– Do we follow the architecture
roadmap
– Do we comply with the rules?
• Performance
– Is the system properly tuned?
– Do the components work
together?
– Do we operate the system
correctly?
• Justification & significance
– Does the system have
business value?
Measurement Approaches
• High level statements of the approach to
obtaining a measurement
• Appropriate to the business need
• In the language of the intended audience
• Culturally specific
Measurement Guidelines
• Measurement should be a repeatable process
(for comparison & prediction)
• Measurement should have a clear
communications role
• Tracking performance
• Assigning resources
• Measurement should yield quantifiable metrics
(percentage, average, numbers, values, etc.)
Metrics Guidelines
• Data used to calculate metrics should be readily
obtainable
• Metrics may (should) be calculated
independently of parties with vested interest
• The type of metric used may change in line with
the maturity of the security process e.g. when
you are highly compliant, consider changing from
conformance measure to significance measure
• Performance metric / trend should be tested
prior to going ‘live’
• Expectations management is key
Types of Metric
• Soft Metrics
– Usually qualitative
– Subjective
– Open to interpretation and opinion (usually of the
authority setting the target or of an official
compliance agent such as a regulator or auditor)
• Hard Metrics
– Usually quantitative
– Objective
– Fixed, not open to opinion or interpretation
Types of Metric
• Descriptive
– Describes the current-state of the object / attribute
being measured
• Comparative
– Describes the current-state of the object / attribute
being measured in comparison with a similar object /
attribute relating to a different place and/or time
• Predictive
– Describes the current-state of the object / attribute
being measured in relation to its trend in order to
project and predict afuture state
Conceptual Measures & Metrics Framework
SABSA Vitality Framework
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecturenarenvivek
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitectureKris Kimmerle
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSAcourses
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architectureMubashirAslam5
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationSeccuris Inc.
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureThe Open Group SA
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSAcourses
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security ArchitectureCisco Canada
 

Was ist angesagt? (20)

Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecture
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes Profiling
 
SABSA Implementation(Part III)_ver1-0
SABSA Implementation(Part III)_ver1-0SABSA Implementation(Part III)_ver1-0
SABSA Implementation(Part III)_ver1-0
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architecture
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
SABSA white paper
SABSA white paperSABSA white paper
SABSA white paper
 
Security review using SABSA
Security review using SABSASecurity review using SABSA
Security review using SABSA
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summary
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
 

Ähnlich wie Enterprise Security Architecture Design

Togaf online training
Togaf online trainingTogaf online training
Togaf online trainingxoomlakshmi
 
Online Togaf 9.1 Training in USA
Online Togaf 9.1 Training in USAOnline Togaf 9.1 Training in USA
Online Togaf 9.1 Training in USAXoom Trainings
 
Week 2-What is Enterprise Architecure (1).pptx
Week 2-What is Enterprise Architecure (1).pptxWeek 2-What is Enterprise Architecure (1).pptx
Week 2-What is Enterprise Architecure (1).pptxRizalPrambudi3
 
Supporting material for my Webinar to the ACS - June2017
Supporting material for my Webinar to the ACS - June2017Supporting material for my Webinar to the ACS - June2017
Supporting material for my Webinar to the ACS - June2017Daljit Banger
 
Framework for developed simple architecture enterprise fdsae
Framework for developed simple architecture enterprise   fdsaeFramework for developed simple architecture enterprise   fdsae
Framework for developed simple architecture enterprise fdsaecsandit
 
System Architect and Rhapsody
System Architect and RhapsodySystem Architect and Rhapsody
System Architect and RhapsodyMartin Owen
 
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...InfosecTrain Education
 
Zachman Enterprise Security Architecture
Zachman Enterprise Security ArchitectureZachman Enterprise Security Architecture
Zachman Enterprise Security ArchitectureJoaquin Marques
 
140910-doverick-agile103.pdf
140910-doverick-agile103.pdf140910-doverick-agile103.pdf
140910-doverick-agile103.pdfmiaoli35
 
Enterprise architecture
Enterprise architectureEnterprise architecture
Enterprise architecturenurmeen1
 
Enterprise Architecture and TOGAF, Quick Look
Enterprise Architecture and TOGAF, Quick LookEnterprise Architecture and TOGAF, Quick Look
Enterprise Architecture and TOGAF, Quick LookSukru Kocakaya
 
Visualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityVisualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityBiZZdesign
 
Datacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda ContentDatacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda ContentNeil Busby
 
How to Build TOGAF Architectures With System Architect (2).ppt
How to Build TOGAF Architectures With System Architect (2).pptHow to Build TOGAF Architectures With System Architect (2).ppt
How to Build TOGAF Architectures With System Architect (2).pptStevenShing
 
Software Architecture
Software ArchitectureSoftware Architecture
Software ArchitectureAhmed Misbah
 
2010 ea conf ra track presentation 20100506
2010 ea conf ra track presentation 201005062010 ea conf ra track presentation 20100506
2010 ea conf ra track presentation 20100506Andy Maes
 
Architecture Series 5-4 Solution Architecture Draft
Architecture Series 5-4   Solution Architecture   DraftArchitecture Series 5-4   Solution Architecture   Draft
Architecture Series 5-4 Solution Architecture DraftFrankie Hsiang
 

Ähnlich wie Enterprise Security Architecture Design (20)

The foundations of EA
The foundations of EAThe foundations of EA
The foundations of EA
 
Togaf online training
Togaf online trainingTogaf online training
Togaf online training
 
Online Togaf 9.1 Training in USA
Online Togaf 9.1 Training in USAOnline Togaf 9.1 Training in USA
Online Togaf 9.1 Training in USA
 
Week 2-What is Enterprise Architecure (1).pptx
Week 2-What is Enterprise Architecure (1).pptxWeek 2-What is Enterprise Architecure (1).pptx
Week 2-What is Enterprise Architecure (1).pptx
 
Supporting material for my Webinar to the ACS - June2017
Supporting material for my Webinar to the ACS - June2017Supporting material for my Webinar to the ACS - June2017
Supporting material for my Webinar to the ACS - June2017
 
Framework for developed simple architecture enterprise fdsae
Framework for developed simple architecture enterprise   fdsaeFramework for developed simple architecture enterprise   fdsae
Framework for developed simple architecture enterprise fdsae
 
System Architect and Rhapsody
System Architect and RhapsodySystem Architect and Rhapsody
System Architect and Rhapsody
 
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
 
Zachman Enterprise Security Architecture
Zachman Enterprise Security ArchitectureZachman Enterprise Security Architecture
Zachman Enterprise Security Architecture
 
140910-doverick-agile103.pdf
140910-doverick-agile103.pdf140910-doverick-agile103.pdf
140910-doverick-agile103.pdf
 
Sadchap01
Sadchap01Sadchap01
Sadchap01
 
Enterprise architecture
Enterprise architectureEnterprise architecture
Enterprise architecture
 
Enterprise Architecture and TOGAF, Quick Look
Enterprise Architecture and TOGAF, Quick LookEnterprise Architecture and TOGAF, Quick Look
Enterprise Architecture and TOGAF, Quick Look
 
Visualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityVisualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and Security
 
TOGAF
TOGAFTOGAF
TOGAF
 
Datacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda ContentDatacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda Content
 
How to Build TOGAF Architectures With System Architect (2).ppt
How to Build TOGAF Architectures With System Architect (2).pptHow to Build TOGAF Architectures With System Architect (2).ppt
How to Build TOGAF Architectures With System Architect (2).ppt
 
Software Architecture
Software ArchitectureSoftware Architecture
Software Architecture
 
2010 ea conf ra track presentation 20100506
2010 ea conf ra track presentation 201005062010 ea conf ra track presentation 20100506
2010 ea conf ra track presentation 20100506
 
Architecture Series 5-4 Solution Architecture Draft
Architecture Series 5-4   Solution Architecture   DraftArchitecture Series 5-4   Solution Architecture   Draft
Architecture Series 5-4 Solution Architecture Draft
 

Mehr von Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

Mehr von Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Kürzlich hochgeladen

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingSelcen Ozturkcan
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Enterprise Security Architecture Design

  • 1. Enterprise Security Architecture Arnab Chattopadhayay Vice President, Engineering Infoworks Inc.
  • 2. Enterprise Architecture • A field born about 30 years ago • Initially targeted to address two problems – System complexity – Inadequate business alignment – Resulting into • More Cost, Less Value
  • 3. Enterprise Architectural Methodologies • Consortia-developed Frameworks – ISO 19439 – RM-ODP (ITU-T X.901-904) – TOGAF • Defense Industry Framework – DoDAF – MODAF – NAF • Government Framework – ESAAF – FEAF – NIST Enterprise Architecture Model • Open Source Frameworks – TRAK – SABSA • Proprietary Frameworks • Zachman Frameworks • IAF (Capgemini, 1993)
  • 4. A Brief History of Enterprise Architecture Zachman’s first article 1987 TAFIM released 1994 Clinger-Cohen bill passed 1996 1998 TAFIM retired FEAF 1.2 released 1999 2002 FEA replaces FEAF TOGAF EE 8.0 released 2003 2003 FEA mostly complete 2011 TOGAF 9.1
  • 5. Zachman Framework (1) • The Zachman "Framework" is actually a taxonomy for organizing architectural artifacts (in other words, design documents, specifications, and models) that takes into account both who the artifact targets (e.g. business owner and builder) and what particular issue (e.g. data and functionality) is being addressed • Two dimensions – Players in the game – Architectural Artifacts • Players in the game: Actors • Architectural Artifacts: the What, How, Where, When, Who and Why • The second dimension is independent of the first – Both the Builder and the Owner need to know the ‘What’ – But, they need to know different ‘What’ • From a Business Owner’s perspective, ‘Data’ means business entity – Example: Customer, Product, Demographic Groups, Inventory • From the developer’s perspective i.e. Builder’s perspective, ‘Data’ means rows and columns organized into table, mathematical joins to implement relationships
  • 6. Zachman Framework (2) • Zachman Framework is typically depicted as a 6 x 6 matrix – Columns: Communication Interrogatives – Rows: Reification Transformation – The Framework Classification is represented by 36 cells – Each cell represents a player’s perspective (e.g. business owner) and a descriptive focus (e.g. data) • Moving horizontally changes description of the system from same player’s perspective • Moving vertically pin down to single focus but changes players
  • 7. Zachman Framework (4) Source: zachmaninternational.com [Executive Mgmt Perspective] [Business Mgmt Perspective] [Architect’s Perspective] [Engineer’s Perspective] [Technician’s Perspective]
  • 8. How Zachman Taxonomy can help building a system architecture • First: use Zachman Taxonomy to the fact that every architecture artifact must live in one and only one cell • Second: achieve architectural completeness by completing every cell • Third: cells in columns should be related to each other.
  • 9. Five Ways Zachman Taxonomy can help building enterprise architecture • Five ways Zachman Taxonomy can help: – Ensure that every stakeholder's perspective has been considered for every descriptive focal point – Improve the Enterprise Architecture artifacts themselves by sharpening each of their focus points to one particular concern for one particular audience – Ensure that all of CxO’s business requirements can be traced down to some technical implementation – Convince Business function of the organization that the technical team isn't planning on building a bunch of useless functionality – Convince Technology team that the business folks are including IT teams in their planning
  • 10. What Zachman Taxonomy does not provide • Does not provide step-by-step process to create new architecture • Does not provide much help in validating an architecture • Does not provide help in deciding future architecture
  • 11. Cyber Security Frameworks • A Cyber Security Framework is a risk-based compilation of guidelines designed to help organizations assess current capabilities and draft a prioritized roadmap toward improved cybersecurity practices Source: NIST
  • 12. Well Known Cyber Security Frameworks • ISO/IEC 27001 & 27002 (formerly ISO 17799) • NIST SP 800-53: Security and Privacy Controls for Federal Information Systems and Organizations • Sherwood Applied Business Security Architecture (SABSA) • NIST SP 800-39: Risk Management Framework • Security in Major IT Management Frameworks
  • 13. What is SABSA • Methodology for: – Developing business-driven, risk and opportunity focused enterprise security & information assurance architectures – Delivering security infrastructure & service management solutions that traceably support critical business initiatives • Comprised of a number of integrated frameworks, models, methods and processes, including: – Business Requirements Engineering Framework (also known as Attributes Profiling) – Risk & Opportunity Management Framework – Policy Architecture Framework – Security Services-Oriented Architecture Framework – Governance Framework – Security Domain Framework – Through-life Security Service & Performance Management
  • 14. Features and Advantages Feature Advantage Business Driven Value-assured Risk Focused Prioritized and proportional responses Comprehensive Scalable scope Modular Agility – ease of implementation and management Open Source (protected) Free use, open source global standard Auditable Demonstrate compliance Transparent Two-way traceability ©SABSA Foundation 2010
  • 15. How is SABSA Used • Information Assurance • Governance, Compliance & Audit • Policy Architecture • Security service management • IT Service management • Security performance management, measures & metrics • Service performance management, measures & metrics • Over-arching decision-making framework for end-to-end solutions • Enterprise Security Architecture • Enterprise Architecture • Individual solutions-based Architectures • Seamless security integration & alignment with other frameworks (including TOGAF, ITIL, ISO27000 series, Zachman, DoDAF, CobIT, NIST, etc.) • Filling the security architecture and security service management gaps in other frameworks • Business requirements engineering • Solutions traceability • Risk & Opportunity Management
  • 16. Sherwood Applied Business Security Architecture (SABSA) Model SABSA Model The SABSA Model comprises six layers. It is based on the well-known Zachman framework1 for developing model for enterprise architecture, although it has been adapted somewhat to a security view of the world.
  • 17. SABSA Model • Comprises of six layers • Based on Zachman framework/taxonomy • The Security Service Management Architecture has been placed vertically across the other five layers – Security management issues arises in every horizontal layer • Each horizontal layers are made of a series of vertical communication interrogatives – What (Assets) – Why (Motivation) – How (Process and Technology) – Who (People) – Where (Location) – When (Time)
  • 18. ©SABSA foundation, 2010 Logical Process Maps & Services Domain Maps Entity & Trust Framework Calendar & Timetable Physical ICT Infrastructure Human Interface Processing Schedule Component Locator Tools & Standards Personnel Management Tools & Standards Step Timing & Sequencing Tools Service Management Service Delivery Management Process Delivery Management Management of Environment Personnel Management Time & Performance Management Information Assets Data Assets ICT Components Process Mechanisms Process Tools & Standards Assets (What) Process (How) Location (Where) People (Who) Time (When) Contextual Business Decisions Business Processes Business Geography Business Governance Business Time Dependence Conceptual Business Knowledge & Risk Strategy Strategies for Process Assurance Domain Framework Roles & Responsibilities Time Management Framework Motivation (Why) Business Risk Risk Management Objectives Risk Management Policies Risk Management Practices Risk Management Tools & Standards Operational Risk Management SABSA Matrix
  • 19. SABSA Lifecycle Business View Contextual Architecture Architect’s View Conceptual Architecture Designer’s View Logical Architecture Builder’s View Physical Architecture Tradesman’s View Component Architecture Service Manager’s View Operational Architecture
  • 20. SABSA Mapping with other Security Standards Applications Presentation Session Transport Network Link Physical Applications Presentation Session Transport Network Link Physical ISO 7498-1 ISO 7498-2 Logical Security Services Physical Security Mechanisms Contextual Architecture Conceptual Architecture Business Driven Requirements & Strategy SABSA Views Logical Architecture Physical Architecture Component Architecture Operational Architecture Service Management Detailed Custom Specification
  • 21. Bringing All Together BusinessStrategy Goals Relatio nship Market Regula tion People Materi als Financ e Produc tion Logisti cs BAP Risk Model Trust Model SecurityStrategy Process Design Policy & Legal Framework Technical Design LogicalSecurityServices Confidentiality Identification Registration Certification Directories Authentication Authorization Access Control Audit Trail PhysicalSecurityMechanism Encryption Naming Procedures Signatures Databases Passwords ACLs Firewalls Event Logs Components TrustedBusinessOperations ProductsTools
  • 23. Approach of Discussing SABSA • Business Context and Requirements • Policy Architecture • Architecture Strategies • Planning and Performance Management • Scope of current discussion – Business context and requirements – Architecture strategies – Planning and performance management • They would be discussed in terms of framework and implementation
  • 25. Scope: Strategy & Planning Phase - Assets
  • 26. Scope: Strategy & Planning Phase - Assets Business Driver Development BAP with KPI’s and KRI’s
  • 27. Business Driven Architecture • Being business-driven means never losing site of the organisation’s goals, objectives, success factors and targets, and ensuring that the security strategy demonstrably supports, enhances and protects them • The contextual architecture captures and presents the full set of relevant requirements for the scope of the assignment – Including conflicts in business strategy, risks & priorities – At this stage we are confirming that they are complete and we understand them – The conceptual layer will later resolve these conflicts by delivering an appropriate, measurable security strategy
  • 28. Credible Abstraction is Key • Meaningful traceability is enabled by credible abstraction from business context (assets, goals & objectives) to a business security context • Traceability therefore starts by delivering two slightly different sets of requirements:
  • 29. Business Attributes • An Attribute is a conceptual abstraction of a real business requirement (the goals, objectives, drivers, targets, and assets confirmed as part of the business contextual architecture) • The Attributes Profiling technique enables any unique set of business requirements to be engineered as a standardized and re-usable set of specifications • The Attributes are modeled into a normalized language that articulates requirements and measures performance in a way that is instinctive to all stakeholders
  • 30. Attributes Profiling Rules & Features • Attributes can be tangible or intangible • Each attribute requires a meaningful name and detailed definition customized specifically for a particular organization • Each attribute requires a measurement approach and metric to be defined during the SABSA Strategy & Planning phase to set performance targets for security • Attributes must be validated (and preferably created) by senior management & the business stake-holders by report, interview or facilitated workshop • The performance targets are then used as the basis for reporting and/or SLAs in the SABSA Manage & Measure phase • Powerful requirements engineering technique • Populates the vital ‘missing link’ between business requirements and technology / process design
  • 31. Two-way Traceability – Drivers to Attributes
  • 32. Two-way Traceability – Attributes to Drivers
  • 33. Sample of Business Drivers Driver # Business Drivers BD1 Protecting the reputation of the Organization, ensuring that it is perceived as competent in its sector BD2 Providing support to the claims made by the Organization about its competence to carry out its intended functions BD3 Protecting the trust that exists in business relationships and propagating that trust across remote electronic business communications links and distributed information systems BD4 Maintaining the confidence of other key parties in their relationships with the Organization BD5 Maintaining the operational capability of the Organization’s systems BD6 Maintaining the continuity of service delivery, including the ability to meet the requirements of service level agreements where these exist BD7 Maintaining the accuracy of information BD8 Maintaining the ability to govern
  • 34.
  • 36. Business Attributes Business Attributes User Attributes Management Attributes Risk Management Attributes Legal/Regulatory Attributes Technical Strategy Attributes Operational Attributes Business Strategy Attributes Business Attribute Business Attribute Definition Suggested Measurement Approach Metric Type User Attributes Accessible Information to which the user is entitled to gain access should be easily found and accessed by that user. Search tree depth necessary to find the information Soft Accurate The information provided to users should be accurate within a range that has been preagreed upon as being applicable to the service being delivered. Acceptance testing on key data to demonstrate compliance with design rules Hard Anonymous For certain specialized types of service, the anonymity of the user should be protected. Rigorous proof of system functionality Red team review Hard Soft Consistent The way in which log-in, navigation, and target services are presented to the user should be consistent across different times, locations, and channels of access. Conformance with design style guides Red team review Soft Current Information provided to users should be current and kept up to date, within a range that has been pre- agreed upon as being applicable for the service being delivered. Refresh rates at the data source and replication of source and replication of refreshed data to the destination. Hard
  • 37. Attribute Profile Business Attributes User Attributes Management Attributes Risk Management Attributes Legal/Regulatory Attributes Technical Strategy Attributes Operational Attributes Business Strategy Attributes Business Attribute Business Driver Business Attribute Definition Measurement Approach Metric Performance Target User Attributes Accessible 5 Information to which the user is entitled to gain access should be easily found and accessed by that user. Search tree depth necessary to find the information Soft Accurate 7 The information provided to users should be accurate within a range that has been preagreed upon as being applicable to the service being delivered. Acceptance testing on key data to demonstrate compliance with design rules Hard Anonymous 4 For certain specialized types of service, the anonymity of the user should be protected. Rigorous proof of system functionality Red team review Hard Soft Consistent 23, 41 The way in which log-in, navigation, and target services are presented to the user should be consistent across different times, locations, and channels of access. Conformance with design style guides Red team review Soft Current 7 Information provided to users should be current and kept up to date, within a range that has been preagreed upon as being applicable for the service being delivered. Refresh rates at the data source and replication of source and replication of refreshed data to the destination. Hard
  • 39. Scope: Strategy & Planning Phase - Process
  • 40. Alignment, Integration & Compliance Strategy • Understand what needs to be aligned, to what purpose, and where it is positioned within the SABSA framework • Business model or business process framework • Legislation, regulation or governance frameworks • Risk management methods, assurance framework or audit approach • IT Architecture framework or method • Controls framework, library or standard • Performance management & reporting framework
  • 41. Strategy & Planning Phase Alignment
  • 47. Application of Multi-tiered Controls In Risk • The multi-tiered controls strategy is modeled against the risk assessment to determine proportional and appropriate response • Contributes to selection of the right control in the right place at the right time • Enables further removal of subjectivity in selection of Risk Treatments • Facilitates construction of databases and risk management tools that respond to definitive risk scenarios with definitive control decisions • Increases speed and ease of use of Risk Assessment
  • 48. Application of SABSA Multi-tier Control
  • 49. Application of Multi-tiered Control Strategy
  • 51. Scope: Strategy & Planning Phase - Time
  • 52. Architecture Strategy & Planning Phase
  • 54. Implementation Phase & Approach • Implementation is an important part of the lifecycle but the SABSA Matrix does not define a specific implementation layer – No need to re-invent Prince2 or PMI etc. • Notoriously difficult to gain business support and budget for pure infrastructure projects • Rare that a major strategic enterprise-wide security architecture is implemented as a single project • More likely (and more sensible) is that the architecture provides a blue-print and a road-map that guides a whole series of separate implementation projects, each of which is driven by a specific business initiative and funded by a budget associated with that initiative
  • 55. Manage & Measure Phase – Lifecycle Overlay • SABSA Architecture traceably abstracts from pure Business Context to: – Pure technical deployment in the Component layer – Pure management in the Service Management layer • The Service Management layer defines all aspects of security management and constructs the means to manage and incorporate change by being presented vertically across the other layers: – Strategy (Context & Concept Layers) – Tactics (Logical, Physical, & Component Layers) – Operations (Security Service Management Matrix)
  • 56. Manage & Measure Phase – SSM Matrix
  • 58. SABSA Risk Management Process Overview
  • 59. Risk Management and the SABSA Matrix
  • 60. SABSA Lifecycle Domain Risk Perspectives
  • 61. Process Improvement Framework – SABSA Maturity Profile (SMP) • Coordinates SABSA process information from all parts of the business – Demonstrates due diligence to senior management, auditors and regulators • Based on Capability Maturity Modeling (CMM) concepts – Qualitative measurement technique for maturity of processes – Six domains mapped onto the SABSA Matrix – Consistent, objective 5-point maturity scale • Identifies, measures and reports compliance practices – Against the SABSA framework, model and processes – Provides a gap analysis to drive a SABSA improvement programme • Can be implemented through a web-enabled tool for – Ease of use, wide involvement, quick responses • Regular use tracks progress and measures changes – Benchmarking against target maturity
  • 62. SABSA Maturity Profile Process Areas SMP Process Areas and SMP Process Activities • Each of the six SMP domains is decomposed into six SMP Process Areas • These SMP Process Areas map onto the six cells of the row of the SABSA • Matrix corresponding to the particular SMP domain • The SMP Process Activities are then derived by overlaying the SABSA • Service Management Matrix onto the SMP Process Areas
  • 65. Performance Management Framework Defining Business-driven Performance Targets
  • 66. Architecture Measurement Categories • Completeness – Do we have all of the components? – Do they form an integrated system? • Assurance – Does the system run smoothly? – Are we assured that it is properly assembled? – Is the system fit-for-purpose? • Compliance – Do we maintain the system? – Do we follow the architecture roadmap – Do we comply with the rules? • Performance – Is the system properly tuned? – Do the components work together? – Do we operate the system correctly? • Justification & significance – Does the system have business value?
  • 67. Measurement Approaches • High level statements of the approach to obtaining a measurement • Appropriate to the business need • In the language of the intended audience • Culturally specific
  • 68. Measurement Guidelines • Measurement should be a repeatable process (for comparison & prediction) • Measurement should have a clear communications role • Tracking performance • Assigning resources • Measurement should yield quantifiable metrics (percentage, average, numbers, values, etc.)
  • 69. Metrics Guidelines • Data used to calculate metrics should be readily obtainable • Metrics may (should) be calculated independently of parties with vested interest • The type of metric used may change in line with the maturity of the security process e.g. when you are highly compliant, consider changing from conformance measure to significance measure • Performance metric / trend should be tested prior to going ‘live’ • Expectations management is key
  • 70. Types of Metric • Soft Metrics – Usually qualitative – Subjective – Open to interpretation and opinion (usually of the authority setting the target or of an official compliance agent such as a regulator or auditor) • Hard Metrics – Usually quantitative – Objective – Fixed, not open to opinion or interpretation
  • 71. Types of Metric • Descriptive – Describes the current-state of the object / attribute being measured • Comparative – Describes the current-state of the object / attribute being measured in comparison with a similar object / attribute relating to a different place and/or time • Predictive – Describes the current-state of the object / attribute being measured in relation to its trend in order to project and predict afuture state
  • 72. Conceptual Measures & Metrics Framework

Hinweis der Redaktion

  1. Essentially started in 1987 with the publication of in the IBM Systems Journal of an article titled "A Framework for Information Systems Architecture," by J.A. Zachman where he laid out both the challenge and the vision of enterprise architectures that would guide the field for the next 20 years U.S. DoD Technical Architecture Framework for Information Management (TAFIM) and was introduced in 1994 which had influenced creation of Clinger-Cohen Act of 1996 which was aimed at improving effectiveness of Govt. IT investments Federal Enterprise Architecture Framework version 1.1 was released in 1999 FEAF renamed to FEA in 2002 TAFIM was retired in 1998 and the work done was turned over to The Open Group who morphed into what is today knows as TOGAF (The Open Group Architecture Framework)