SlideShare ist ein Scribd-Unternehmen logo
1 von 27
July 19, 2011 Modeling RBAC with SABSA, TOGAF and ArchiMateCreating a Foundation for Understanding and Action Iver Band, CISSP - Open Group Conference, Austin, Texas
About The Standard The RBAC standard Modeling motivations and objectives  Framework analysis and comparison  Modeling approach Diagrams that justify and explain RBAC Conclusion References Agenda July 17, 2011 2 Thanks to Kevin Graham, CISSP and enterprise security architect at The Standard, for his partnership in this work
Financial services company Founded in 1906 Our purpose:  To help people achieve financial 	security so they can confidently 	pursue their dreams Expertise: Group Life & Disability Insurance Individual Disability Insurance Retirement Plans Individual Annuities Commercial Mortgages Headquarters in Portland, OR 3,100 Employees 3 The Standard July 17, 2011
4 IT at The Standard July 17, 2011
5 Typical Access Control Challenges July 17, 2011 Portal SharePoint Mainframe Oracle Business Applications ActiveDirectory UNIX LAN  Share SQL  Server HR/Benefits Remote ,[object Object]
Insufficient understanding of identity and access management best practices
Inadequate visibility of access control mechanisms, changes and outcomes,[object Object]
Four standard and cumulative levels (1) Core,  (2) Hierarchical,  (3) Constrained,  (4) Symmetric All levels support Restriction of user permissions to those acquired through roles Many-to-many user-role and role-permission  assignment Review of user-role assignments Simultaneous user access to permissions of multiple roles Level 2 adds variants with differing hierarchy support Support for an arbitrary partial order (reflexive, transitive, anti-symmetric) Any restriction on the structure of the role hierarchy, for example: Tree or inverted tree, limited inheritance or activation, depth limits Level 3 adds separation of duty (SOD) support Level 4 adds permission-role review with performance comparable            to user-role review 7 RBAC Concepts July 17, 2011
Business drivers Increase the efficiency, agility and transparency of access control  Support strategic requirements for  enterprise-wide and federated identity and access management IT drivers Increase RBAC understanding of both IT and key user personnel Derive greater value from existing identity management investments and justify further investment Support identity and access management for enterprise initiatives such as CRM and Contact Center Reduce administrative burden on IT by making access control comprehensible to the broader business community Demonstrate relevance of TOGAF and ArchiMate to security      architecture 8 RBAC Modeling and Knowledge Transfer Motivations July 17, 2011
Desired State 9 Well-Designed RBAC Is Easy to Understand July 17, 2011 All-Too-Typical State Local roles aligned with system context  Local roles aligned with business context
This effort is not fundamentally about technology It is about getting people to think differently about access control Change behavior immediately and measurably Systems and access administration requests and configurations Lay the groundwork for successful investments in identity and access management solutions It requires two types of communication to a range of business and IT stakeholders Justification:Demonstrate the need for systematic access control Explanation:  Explain how RBAC works and how it satisfies the need 10 Modeling Objectives July 17, 2011
11 How Can Our Chosen Frameworks Help? July 17, 2011
12 TOGAF and SABSA Have Comparable Methods for our Purposes July 17, 2011 SABSA Lifecycle TOGAF ADM
13 Contextual and Conceptual Architecture are Organized Differently in Each Paradigm July 17, 2011 ArchiMate2.0 DraftCore and Extensions SABSAModel for Security Architecture TOGAF Version 9Full Content Metamodel Contextual ServiceMgmt Principles, Vision, Requirements Extensions ,[object Object]
Governance
Process
Data
Services
Infrastructure ConsolidationBusiness Motivation Conceptual Business Application Logical Information Systems Technology Physical Technology Implementation and Migration Component Realization
Select cells from SABSA Matrix for RBAC justificationand explanation Strength:Comprehensive treatment of enterprise security architecture Select best fitting TOGAF catalogs, matrices and diagram types Strength: Comprehensive treatment of enterprise architecture (EA) Select best fitting ArchiMate diagram types Strength:General EA visual modeling language with broad coverage of TOGAF, particularly in the 2.0 draft specification Adapt viewpoints as necessary to express SABSA objectives Create catalogs and matrices Straightforward based on TOGAF 9 guidance This presentation will instead focus on diagrams Create ArchiMate diagrams based on selected TOGAF and ArchiMate viewpoints 14 Our Modeling Approach Leverages Strengths of Each Standard July 17, 2011
15 The Top Two Rows of the SABSA Matrix Have Relevant Content July 17, 2011 Explain RBAC Justify RBAC
Each Selected SABSA Matrix Cell Corresponds to Multiple TOGAF and ArchiMate Viewpoints
17 TOGAF Value Chain Diagram Justify RBAC Explain RBAC RBAC resulted in $6 billion in US economic benefits from 2002-2009, according to 2010 economic analysis commissioned by US NIST, from which this diagram was adapted
18 Justify RBAC ArchiMate Motivation Diagram July 17, 2011
19 Justify RBAC ArchiMate Actor Cooperation Diagram July 17, 2011
20 Justify RBAC ArchiMate Landscape Map July 17, 2011 Enterprise  CRM Application Mortgage Solution Plan Admin  App Policy Admin App Hosted Advisor Work-bench  Hosted Vertical  Industry Solution  Claims App A Document Mgmt System B Document Mgmt System A
21 TOGAF Solution Concept Diagram July 17, 2011 Explain RBAC

Weitere ähnliche Inhalte

Andere mochten auch

Cloud architecture with the ArchiMate Language
Cloud architecture with the ArchiMate LanguageCloud architecture with the ArchiMate Language
Cloud architecture with the ArchiMate LanguageIver Band
 
Mcs2453 aniq mc101053-assignment2
Mcs2453 aniq mc101053-assignment2Mcs2453 aniq mc101053-assignment2
Mcs2453 aniq mc101053-assignment2Aniq Eastrarulkhair
 
From Capability-Based Planning to Competitive Advantage: Assembling Your Bus...
From Capability-Based Planning to Competitive Advantage:  Assembling Your Bus...From Capability-Based Planning to Competitive Advantage:  Assembling Your Bus...
From Capability-Based Planning to Competitive Advantage: Assembling Your Bus...Iver Band
 
Modeling Big Data with the ArchiMate 3.0 Language
Modeling Big Data with the ArchiMate 3.0 LanguageModeling Big Data with the ArchiMate 3.0 Language
Modeling Big Data with the ArchiMate 3.0 LanguageIver Band
 
М.Акоев -- системная динамика и мышление
М.Акоев -- системная динамика и мышлениеМ.Акоев -- системная динамика и мышление
М.Акоев -- системная динамика и мышлениеAnatoly Levenchuk
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSAcourses
 
Zachman Framework As Enterprise Architecture Ontology
Zachman Framework As Enterprise Architecture OntologyZachman Framework As Enterprise Architecture Ontology
Zachman Framework As Enterprise Architecture OntologyOsama Abandeh
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachFemi Ashaye
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2
 
An Introduction to Enterprise Architecture Visual Modeling With The ArchiMate...
An Introduction to Enterprise Architecture Visual Modeling With The ArchiMate...An Introduction to Enterprise Architecture Visual Modeling With The ArchiMate...
An Introduction to Enterprise Architecture Visual Modeling With The ArchiMate...Iver Band
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitecturePriyanka Aash
 
WSO2Con USA 2017: Identity Solution Patterns
WSO2Con USA 2017: Identity Solution PatternsWSO2Con USA 2017: Identity Solution Patterns
WSO2Con USA 2017: Identity Solution PatternsWSO2
 
SABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextSABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextDavid Sweigert
 
Practical Stakeholder Engagement
Practical Stakeholder EngagementPractical Stakeholder Engagement
Practical Stakeholder EngagementSABSA_Institute
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitecturePriyanka Aash
 

Andere mochten auch (18)

Cloud architecture with the ArchiMate Language
Cloud architecture with the ArchiMate LanguageCloud architecture with the ArchiMate Language
Cloud architecture with the ArchiMate Language
 
Mcs2453 aniq mc101053-assignment2
Mcs2453 aniq mc101053-assignment2Mcs2453 aniq mc101053-assignment2
Mcs2453 aniq mc101053-assignment2
 
From Capability-Based Planning to Competitive Advantage: Assembling Your Bus...
From Capability-Based Planning to Competitive Advantage:  Assembling Your Bus...From Capability-Based Planning to Competitive Advantage:  Assembling Your Bus...
From Capability-Based Planning to Competitive Advantage: Assembling Your Bus...
 
Modeling Big Data with the ArchiMate 3.0 Language
Modeling Big Data with the ArchiMate 3.0 LanguageModeling Big Data with the ArchiMate 3.0 Language
Modeling Big Data with the ArchiMate 3.0 Language
 
Integrating Zachman and TOGAF-ADM
Integrating Zachman and TOGAF-ADMIntegrating Zachman and TOGAF-ADM
Integrating Zachman and TOGAF-ADM
 
М.Акоев -- системная динамика и мышление
М.Акоев -- системная динамика и мышлениеМ.Акоев -- системная динамика и мышление
М.Акоев -- системная динамика и мышление
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes Profiling
 
Zachman Framework As Enterprise Architecture Ontology
Zachman Framework As Enterprise Architecture OntologyZachman Framework As Enterprise Architecture Ontology
Zachman Framework As Enterprise Architecture Ontology
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture Approach
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product Overview
 
An Introduction to Enterprise Architecture Visual Modeling With The ArchiMate...
An Introduction to Enterprise Architecture Visual Modeling With The ArchiMate...An Introduction to Enterprise Architecture Visual Modeling With The ArchiMate...
An Introduction to Enterprise Architecture Visual Modeling With The ArchiMate...
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Archimate Viewpoints
Archimate ViewpointsArchimate Viewpoints
Archimate Viewpoints
 
SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0
 
WSO2Con USA 2017: Identity Solution Patterns
WSO2Con USA 2017: Identity Solution PatternsWSO2Con USA 2017: Identity Solution Patterns
WSO2Con USA 2017: Identity Solution Patterns
 
SABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextSABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 context
 
Practical Stakeholder Engagement
Practical Stakeholder EngagementPractical Stakeholder Engagement
Practical Stakeholder Engagement
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 

Mehr von Iver Band

Enhancing Organizational Performance by Creating a Culture of Stewardship wit...
Enhancing Organizational Performance by Creating a Culture of Stewardship wit...Enhancing Organizational Performance by Creating a Culture of Stewardship wit...
Enhancing Organizational Performance by Creating a Culture of Stewardship wit...Iver Band
 
Chronic Absenteeism Rate Prediction: A Data Science Case Study
Chronic Absenteeism Rate Prediction: A Data Science Case StudyChronic Absenteeism Rate Prediction: A Data Science Case Study
Chronic Absenteeism Rate Prediction: A Data Science Case StudyIver Band
 
What Can We Do With The ArchiMate Language?
What Can We Do With The ArchiMate Language?What Can We Do With The ArchiMate Language?
What Can We Do With The ArchiMate Language?Iver Band
 
The ArchiMate Language for Enterprise and Solution Architecture
The ArchiMate Language for Enterprise and Solution ArchitectureThe ArchiMate Language for Enterprise and Solution Architecture
The ArchiMate Language for Enterprise and Solution ArchitectureIver Band
 
ArchiMate 3.0: A New Standard for Architecture
ArchiMate 3.0: A New Standard for ArchitectureArchiMate 3.0: A New Standard for Architecture
ArchiMate 3.0: A New Standard for ArchitectureIver Band
 
An Introduction to the ArchiMate 3.0 Specification
An Introduction to the ArchiMate 3.0 SpecificationAn Introduction to the ArchiMate 3.0 Specification
An Introduction to the ArchiMate 3.0 SpecificationIver Band
 
Using the TOGAF® 9.1 Framework with the ArchiMate® 2.1 Modeling Language
Using the TOGAF® 9.1 Framework with the ArchiMate® 2.1 Modeling LanguageUsing the TOGAF® 9.1 Framework with the ArchiMate® 2.1 Modeling Language
Using the TOGAF® 9.1 Framework with the ArchiMate® 2.1 Modeling LanguageIver Band
 
Always-On Services for Consumer Web, Mobile and the Internet of Things
Always-On Services for Consumer Web, Mobile and the Internet of ThingsAlways-On Services for Consumer Web, Mobile and the Internet of Things
Always-On Services for Consumer Web, Mobile and the Internet of ThingsIver Band
 
Effective Strategy Execution with Capability-Based Planning, Enterprise Arch...
Effective Strategy Execution with Capability-Based Planning, Enterprise Arch...Effective Strategy Execution with Capability-Based Planning, Enterprise Arch...
Effective Strategy Execution with Capability-Based Planning, Enterprise Arch...Iver Band
 
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...Iver Band
 
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...Iver Band
 
Enterprise Architecture with the Zachman Framework and the Archimate Language
Enterprise Architecture with the Zachman Framework and the Archimate LanguageEnterprise Architecture with the Zachman Framework and the Archimate Language
Enterprise Architecture with the Zachman Framework and the Archimate LanguageIver Band
 
Book Review: Making Technology Investments Profitable
Book Review:  Making Technology Investments ProfitableBook Review:  Making Technology Investments Profitable
Book Review: Making Technology Investments ProfitableIver Band
 
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...Iver Band
 
Thought Leader Interview: Allen Podraza on Records Management
Thought Leader Interview: Allen Podraza on Records ManagementThought Leader Interview: Allen Podraza on Records Management
Thought Leader Interview: Allen Podraza on Records ManagementIver Band
 
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vi...
Visualizing IT at the Department of Homeland Security with the  ArchiMate® Vi...Visualizing IT at the Department of Homeland Security with the  ArchiMate® Vi...
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vi...Iver Band
 
ArchiMetal Case Study
ArchiMetal Case StudyArchiMetal Case Study
ArchiMetal Case StudyIver Band
 
EAPJ Volume II April 2014
EAPJ Volume II April 2014EAPJ Volume II April 2014
EAPJ Volume II April 2014Iver Band
 
Modeling ACORD with ArchiMate Case Study Views
Modeling ACORD with ArchiMate Case Study ViewsModeling ACORD with ArchiMate Case Study Views
Modeling ACORD with ArchiMate Case Study ViewsIver Band
 
Building an Effective Enterprise Architecture Capability Using TOGAF and the ...
Building an Effective Enterprise Architecture Capability Using TOGAF and the ...Building an Effective Enterprise Architecture Capability Using TOGAF and the ...
Building an Effective Enterprise Architecture Capability Using TOGAF and the ...Iver Band
 

Mehr von Iver Band (20)

Enhancing Organizational Performance by Creating a Culture of Stewardship wit...
Enhancing Organizational Performance by Creating a Culture of Stewardship wit...Enhancing Organizational Performance by Creating a Culture of Stewardship wit...
Enhancing Organizational Performance by Creating a Culture of Stewardship wit...
 
Chronic Absenteeism Rate Prediction: A Data Science Case Study
Chronic Absenteeism Rate Prediction: A Data Science Case StudyChronic Absenteeism Rate Prediction: A Data Science Case Study
Chronic Absenteeism Rate Prediction: A Data Science Case Study
 
What Can We Do With The ArchiMate Language?
What Can We Do With The ArchiMate Language?What Can We Do With The ArchiMate Language?
What Can We Do With The ArchiMate Language?
 
The ArchiMate Language for Enterprise and Solution Architecture
The ArchiMate Language for Enterprise and Solution ArchitectureThe ArchiMate Language for Enterprise and Solution Architecture
The ArchiMate Language for Enterprise and Solution Architecture
 
ArchiMate 3.0: A New Standard for Architecture
ArchiMate 3.0: A New Standard for ArchitectureArchiMate 3.0: A New Standard for Architecture
ArchiMate 3.0: A New Standard for Architecture
 
An Introduction to the ArchiMate 3.0 Specification
An Introduction to the ArchiMate 3.0 SpecificationAn Introduction to the ArchiMate 3.0 Specification
An Introduction to the ArchiMate 3.0 Specification
 
Using the TOGAF® 9.1 Framework with the ArchiMate® 2.1 Modeling Language
Using the TOGAF® 9.1 Framework with the ArchiMate® 2.1 Modeling LanguageUsing the TOGAF® 9.1 Framework with the ArchiMate® 2.1 Modeling Language
Using the TOGAF® 9.1 Framework with the ArchiMate® 2.1 Modeling Language
 
Always-On Services for Consumer Web, Mobile and the Internet of Things
Always-On Services for Consumer Web, Mobile and the Internet of ThingsAlways-On Services for Consumer Web, Mobile and the Internet of Things
Always-On Services for Consumer Web, Mobile and the Internet of Things
 
Effective Strategy Execution with Capability-Based Planning, Enterprise Arch...
Effective Strategy Execution with Capability-Based Planning, Enterprise Arch...Effective Strategy Execution with Capability-Based Planning, Enterprise Arch...
Effective Strategy Execution with Capability-Based Planning, Enterprise Arch...
 
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...
 
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...
 
Enterprise Architecture with the Zachman Framework and the Archimate Language
Enterprise Architecture with the Zachman Framework and the Archimate LanguageEnterprise Architecture with the Zachman Framework and the Archimate Language
Enterprise Architecture with the Zachman Framework and the Archimate Language
 
Book Review: Making Technology Investments Profitable
Book Review:  Making Technology Investments ProfitableBook Review:  Making Technology Investments Profitable
Book Review: Making Technology Investments Profitable
 
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
 
Thought Leader Interview: Allen Podraza on Records Management
Thought Leader Interview: Allen Podraza on Records ManagementThought Leader Interview: Allen Podraza on Records Management
Thought Leader Interview: Allen Podraza on Records Management
 
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vi...
Visualizing IT at the Department of Homeland Security with the  ArchiMate® Vi...Visualizing IT at the Department of Homeland Security with the  ArchiMate® Vi...
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vi...
 
ArchiMetal Case Study
ArchiMetal Case StudyArchiMetal Case Study
ArchiMetal Case Study
 
EAPJ Volume II April 2014
EAPJ Volume II April 2014EAPJ Volume II April 2014
EAPJ Volume II April 2014
 
Modeling ACORD with ArchiMate Case Study Views
Modeling ACORD with ArchiMate Case Study ViewsModeling ACORD with ArchiMate Case Study Views
Modeling ACORD with ArchiMate Case Study Views
 
Building an Effective Enterprise Architecture Capability Using TOGAF and the ...
Building an Effective Enterprise Architecture Capability Using TOGAF and the ...Building an Effective Enterprise Architecture Capability Using TOGAF and the ...
Building an Effective Enterprise Architecture Capability Using TOGAF and the ...
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Kürzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Enterprise Security Modeling and Analysis with TOGAF®, ArchiMate® and SABSA

  • 1. July 19, 2011 Modeling RBAC with SABSA, TOGAF and ArchiMateCreating a Foundation for Understanding and Action Iver Band, CISSP - Open Group Conference, Austin, Texas
  • 2. About The Standard The RBAC standard Modeling motivations and objectives Framework analysis and comparison Modeling approach Diagrams that justify and explain RBAC Conclusion References Agenda July 17, 2011 2 Thanks to Kevin Graham, CISSP and enterprise security architect at The Standard, for his partnership in this work
  • 3. Financial services company Founded in 1906 Our purpose: To help people achieve financial security so they can confidently pursue their dreams Expertise: Group Life & Disability Insurance Individual Disability Insurance Retirement Plans Individual Annuities Commercial Mortgages Headquarters in Portland, OR 3,100 Employees 3 The Standard July 17, 2011
  • 4. 4 IT at The Standard July 17, 2011
  • 5.
  • 6. Insufficient understanding of identity and access management best practices
  • 7.
  • 8. Four standard and cumulative levels (1) Core, (2) Hierarchical, (3) Constrained, (4) Symmetric All levels support Restriction of user permissions to those acquired through roles Many-to-many user-role and role-permission assignment Review of user-role assignments Simultaneous user access to permissions of multiple roles Level 2 adds variants with differing hierarchy support Support for an arbitrary partial order (reflexive, transitive, anti-symmetric) Any restriction on the structure of the role hierarchy, for example: Tree or inverted tree, limited inheritance or activation, depth limits Level 3 adds separation of duty (SOD) support Level 4 adds permission-role review with performance comparable to user-role review 7 RBAC Concepts July 17, 2011
  • 9. Business drivers Increase the efficiency, agility and transparency of access control Support strategic requirements for enterprise-wide and federated identity and access management IT drivers Increase RBAC understanding of both IT and key user personnel Derive greater value from existing identity management investments and justify further investment Support identity and access management for enterprise initiatives such as CRM and Contact Center Reduce administrative burden on IT by making access control comprehensible to the broader business community Demonstrate relevance of TOGAF and ArchiMate to security architecture 8 RBAC Modeling and Knowledge Transfer Motivations July 17, 2011
  • 10. Desired State 9 Well-Designed RBAC Is Easy to Understand July 17, 2011 All-Too-Typical State Local roles aligned with system context Local roles aligned with business context
  • 11. This effort is not fundamentally about technology It is about getting people to think differently about access control Change behavior immediately and measurably Systems and access administration requests and configurations Lay the groundwork for successful investments in identity and access management solutions It requires two types of communication to a range of business and IT stakeholders Justification:Demonstrate the need for systematic access control Explanation: Explain how RBAC works and how it satisfies the need 10 Modeling Objectives July 17, 2011
  • 12. 11 How Can Our Chosen Frameworks Help? July 17, 2011
  • 13. 12 TOGAF and SABSA Have Comparable Methods for our Purposes July 17, 2011 SABSA Lifecycle TOGAF ADM
  • 14.
  • 17. Data
  • 19. Infrastructure ConsolidationBusiness Motivation Conceptual Business Application Logical Information Systems Technology Physical Technology Implementation and Migration Component Realization
  • 20. Select cells from SABSA Matrix for RBAC justificationand explanation Strength:Comprehensive treatment of enterprise security architecture Select best fitting TOGAF catalogs, matrices and diagram types Strength: Comprehensive treatment of enterprise architecture (EA) Select best fitting ArchiMate diagram types Strength:General EA visual modeling language with broad coverage of TOGAF, particularly in the 2.0 draft specification Adapt viewpoints as necessary to express SABSA objectives Create catalogs and matrices Straightforward based on TOGAF 9 guidance This presentation will instead focus on diagrams Create ArchiMate diagrams based on selected TOGAF and ArchiMate viewpoints 14 Our Modeling Approach Leverages Strengths of Each Standard July 17, 2011
  • 21. 15 The Top Two Rows of the SABSA Matrix Have Relevant Content July 17, 2011 Explain RBAC Justify RBAC
  • 22. Each Selected SABSA Matrix Cell Corresponds to Multiple TOGAF and ArchiMate Viewpoints
  • 23. 17 TOGAF Value Chain Diagram Justify RBAC Explain RBAC RBAC resulted in $6 billion in US economic benefits from 2002-2009, according to 2010 economic analysis commissioned by US NIST, from which this diagram was adapted
  • 24. 18 Justify RBAC ArchiMate Motivation Diagram July 17, 2011
  • 25. 19 Justify RBAC ArchiMate Actor Cooperation Diagram July 17, 2011
  • 26. 20 Justify RBAC ArchiMate Landscape Map July 17, 2011 Enterprise CRM Application Mortgage Solution Plan Admin App Policy Admin App Hosted Advisor Work-bench Hosted Vertical Industry Solution Claims App A Document Mgmt System B Document Mgmt System A
  • 27. 21 TOGAF Solution Concept Diagram July 17, 2011 Explain RBAC
  • 28. 22 ArchiMate Product Diagram July 17, 2011 Justify RBAC Explain RBAC
  • 29. 23 Review: RBAC Levels July 17, 2011
  • 30. 24 Explain RBAC ArchiMate Application Behavior View July 17, 2011
  • 31. TOGAF, ArchiMate and SABSA each provide broad and deep value for enterprise architects, regardless of their specialty Integrating these three paradigms today requires significant effort, since they cover much but not all of the same ground, often with similar but not strictly equivalent concepts Fortunately, there are Open Group efforts underway to integrate TOGAF and SABSA The TOGAF and ArchiMate content frameworks Architects can use RBAC to improve the effectiveness, scalability, transparency and agility of access control Architects can use SABSA, TOGAF and ArchiMate To model, portray and analyze planned or actual RBAC solutions As a rigorous foundation for a wide range of stakeholder communications 25 Conclusion July 17, 2011
  • 32. The NIST Model for Role-Based Access Control: Towards a Unified Standard http://csrc.nist.gov/groups/SNS/rbac/documents/towards-std.pdf ANSI INCITS 359-2004 Information Technology Role-Based Access Control http://www.techstreet.com/standards/incits/359_2004?product_id=1151353 Sherwood Applied Business Security Architecture (SABSA) http://www.sabsa.org/publications.aspx Executive White Paper on Enterprise Security Architecture Enterprise Security Architecture: A Business-Driven Approach TOGAF 9 standard online http://pubs.opengroup.org/architecture/togaf9-doc/arch ArchiMate Version 1.0 standard online http://www.opengroup.org/archimate/index.htm Economic Benefits of Role-Based Access Control http://csrc.nist.gov/groups/SNS/rbac/documents/20101219_RBAC2_Final_Report.pdf Speaker contact:Iver.Band@standard.com 26 References July 17, 2011

Hinweis der Redaktion

  1. This is a rapid-fire presentation with lots of detail. You may not retain all of it the first time through. Afterwards, I encourage you to review the slides—email me for a copy with speaker notes–and speaker notes and email me with any questions. Note that the information in this presentation about The Standard’s systems and processes are simplified examples that may or may not reflect our current or future states.
  2. InsuranceLife, Accidental Death and Dismemberment, Disability, Dental, Vision and AnnuitiesRetirement plansPublic and private-sectorDefined benefit (pension) and defined contributionVisit www.standard.com
  3. In both diagrams, the Manager business role aggregates a number of system-specific roles. In the All-Too-Typical state, these relationships may seem arbitrary, but in the Desired State the relationships are clear. ArchiMate concepts and relationships are in italics.All-Too-Typical StateBusiness roles are not always defined consistently across organizationsBusiness roles have varying relationships with system rolesIndividual initiative is required to enforce many routine role transitionsBusiness-driven access control rule changes often require significant investigation and manual workDesired StateBusiness roles are clearly defined in a companywide context System roles clearly correspond to business rolesBusiness role changes trigger timely and accurate system role changesAuthorized administrators can alter access control policies quickly, efficiently, reliably and verifiably.
  4. For our purposes, a visual modeling language for enterprise architecture allows the creation of unambiguous diagrams that fulfill the requirements of our chosen paradigms. Only ArchiMate includes such a language, for which we will demonstrate its applicability to expressing selected TOGAF and SABSA deliverables.SABSA contains just development procedures, verbal descriptions of relevant content and examples, but not explicit viewpoint definitionsTOGAF contains verbal descriptions of catalogs, matrices and diagramsArchiMate contains both verbal descriptions of diagrams and explicit meta-diagrams and examples
  5. The SABSA Matrix has six rows, and only the top two are shown here.
  6. This presentation includes examples of diagrams listed in boldface.
  7. RBAC resulted in $6 billion in US economic benefits from 2002-2009, according to 2010 economic analysis commissioned by US NIST, from which this diagram was adaptedThe RBAC value chain is a series of processesthat each have a number of rolesassigned to them. The “Theory and Standards Development” process is associated with four goals. The final “Incorporation and Usage…” process is associated with three kinds of value identified in the NIST-sponsored analysis.
  8. Here we use the ArchiMate 2.0 draft Motivation Extension to illustrate stakeholders and their concerns, along with assessments and requirements related to those concerns. Nesting of symbols is used here to show aggregation. ArchiMate concepts and relationships are in italics.
  9. Nested organizations modeled as business actors are assigned to collaborations with each other and with external roles, This justifies RBAC by illustrating the complexity and criticality of shared activities across organizations.Nesting of symbols is used here to show composition. ArchiMate concepts and relationships are in italics.
  10. This diagram shows how a number of lines of business use a variety of applications for different business functions. It contains example data only.
  11. The RBAC System Support application functions are associated with the Session Creation event, which triggers an Access Check event. These events are a part of a longer sequence that begins with an access request and ends, assuming the request is allowed, with authorized access. The session is associated with an Active Role Set data object. Each user business actor aggregates an active role set for each session in progress, and is associated with all of the events. The Administrator business actor is assigned to the “Manage User, Role and Permission Relationships" business function. The RBAC Administration application function is used by “Manage User…”, and data flows from RBAC Administration to RBAC System Support. ArchiMate concepts and relationships are in italics.
  12. RBAC for Target Applications is a product that aggregates a number of business services and application services, is associated with a number of infrastructure services, and delivers value in the form of security, scalability, agility and transparency. Each type of service is aggregated by a group. ArchiMate concepts and relationships are in italics.
  13. Both the RBAC Administration and RBAC Systems Support application functions aggregate a number of more specialized applicationfunctions, which in turn access a number of data objects. The Session data object aggregates a number of roles and an authenticated user identity, and also contains (composition relationship) the Active Role Set. Two of the application functions at the top of the diagram share a constraint, and the Manage Role Hierarchy application function is associated with a requirement.The application functions, requirement, constraint and objects that are not required by all RBAC levels have numbers in parentheses to indicate where they are required.ArchiMate concepts and relationships are in italics.
  14. The presenter has delivered this material to TheStandard’s information security director, who requested additional sessions with his staff.