SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
Five Essential Enterprise
               Architecture Practices to Create the
                   Security-Aware Enterprise




Presented by

	
  
The Enterprise Architect is                              :
               Ideally Positioned to Help
               Improve IT Security.
               Security efforts need to help the business achieve its
               objectives while reducing risk, whether the
               enterprise wants to:
                 Launch a new Web site.
                 Create a database.
                 Build a collaboration platform.
                   Embrace mobility.
                   Move to Cloud computing.


Presented by

	
  
Everything with which the Enterprise Architect
               is charged speaks directly to business
               alignment–across technologies, workflows
               and roles!




Presented by

	
  
The Enterprise Architect’s
               Charges* Include:                                         :
                   Supporting enterprise goals.
                   Helping build and support business processes.
                   Enhancing organizational structure and culture.
                   Designing sustainable IT systems and applications.

               *All of which must be done with security in mind.




Presented by

	
  
Business Alignment Falters When
                                                                               !
               Security is Bolted on, not Built in.
                 Despite the importance of IT security in keeping data
                  and enterprise systems secure and ensuring that the
                  enterprise operates within regulatory compliance
                  requirements, the tendency is to add security onto systems
                  after they’ve been built.

                 Or worse, after they’ve been deployed.



Presented by

	
  
The High Cost of Failure                                                                   !
                 Generally, it is much more difficult to add security to a
                   system after it has been designed or once deployed than it is
                   to build it right to begin with.
                 Worse yet, bolt-on approaches are more likely to lead to
                   costly security failures, such as breaches:

               High Price of a Security Failure
               Cost of a data breach                                        $214 per compromised record

               Average cost per data breach event                           $7.2 million

               Source: Ponemon Institute U.S. Cost of a Data Breach report, 2011



Presented by

	
  
Driving Coordination, Effecting Change
                 Building inherently secure applications and systems requires
                  tight, open and upfront coordination among many groups.

                 Enterprise architects are in the position to drive that
                  coordination and effect the required change that depends on it.

                 Because their work is so integral to business alignment−and to
                  driving the agility the enterprise requires to deliver better
                  business service–enterprise architects have a firm
                  understanding of how systems are being deployed, as well as
                  knowledge of the business objectives behind these systems.

Presented by

	
  
Thus:
                 The enterprise architect can drive value in aligning security
                  teams, quality assurance teams, developers, the office of the
                  CIO, and business managers and executives.

                 All those parties — in conjunction with the enterprise architect
                  — must work together to ensure that the focus and resources
                  necessary to maintain a secure IT posture are in place.




Presented by

	
  
Still, This Won’t Be Easy . . .                                …
               This may be the first time all of these groups work together early
               in the solutions creation process. Expect tension. For instance:

                 Security teams may request certain controls that could seem
                  onerous to others involved in the effort (including enterprise IT
                  architects).

                 Developers may view security as a roadblock at times–and
                  shun its input.




Presented by

	
  
Taking the Lead, Breaking Bad Habits
                 59 percent of enterprise development teams are not
                  following quality and security processes "rigorously"
                                                                                                                      :
                  when developing new software.
                 26 percent have few or no secure software              	
  	
  
                  development processes.                           	
  	
  	
  	
  	
  
                 Only 48 percent claim to follow audit procedures
                  rigorously.
                 More than 70 percent felt that there was insufficient
                  security guidance for key technology models such as
                  cloud, virtualization, mobile devices and mainframes.
Presented by     Source: Creative Intellect Consulting, “The State of Secure Application Lifecycle Management.” The report was
                 based on a survey of software development, IT and information security professionals around the world.
	
  
“We’d like to see organizations taking a multi-faceted          ”
               approach to tackling the…security challenge.
               ‘Secure by Design and Practice’ should be the call to action
               adopted by organizations to address the software security
               challenge more directly.”

                      —Bola Rotibi, founder of Creative Intellect Consulting




Presented by

	
  
Five Essential Enterprise Architecture
                  Practices to Create
             the Security-Aware Enterprise




               1.  Get executive sponsorship.
               2.  Foster a collaborative environment.
               3.  Pick, at first, easily attainable projects.
Presented by
               4.  Evaluate security risks during planning & design.
	
  
               5.  Build security processes into workflow.
Step 1: Get Executive Sponsorship



               In order for enterprise architects to get security, operations
               and other teams to work cohesively together, it’s helpful to
               insert executive leadership into the process, so they can set
               business objectives and expectations across teams. Should
               security processes or communications break down, executive
               leadership can reiterate those processes’ importance to the
               business.
               Without such political cover, efforts can quickly fray and
               fall apart.

Presented by

	
  
Step 1: Get Executive Sponsorship




               Setting the stage for the integration of security through the
               development process will change how new initiatives are built,
               and how the operations work together. Win political
               sponsorship to get started by:
                 Showing business leaders the threats against the company.
                 Demonstrating how integrating security into a product or
                  application from the start can reduce risk.
                 Demonstrating areas where cost of securing systems can be
                  reduced through integrating security processes with design.
Presented by

	
  
Step 1: Get Executive Sponsorship



               This level of sponsorship should be easier today than it was
               just a few years ago, as security is reporting less often to
               the CIO’s office and increasingly to the board of directors.
               That’s a level of recognition for their work that can’t be
               ignored by any other groups associated with a project:




Presented by

	
  
Step 1: Get Executive Sponsorship



               The Changing Reporting Structure for CISOs/Equivalent
               Information Security Leaders




               Source: PricewaterhouseCoopers LLP: 2011 Global State of Information Security Survey
               * This calculation measures the difference between response levels over a three-year period from 2007 to 2010.


Presented by

	
  
Step 2: Foster a Collaborative
                 Environment, Starting with the
                 Security Team



               Encourage information security’s involvement as an enabler.
               Engage with the CISO’s office as a consultative resource to
               evaluate the business risk of new initiatives and have the staff
               propose alternatives for reducing that risk.




Presented by

	
  
Step 2: Foster a Collaborative
                  Environment, Starting with the
                  Security Team



               What would collaboration entail?
               Example: A new application is to be built. The enterprise
               architect can bring the security team into the picture during the
               design phase to evaluate access controls, secure architecture
               and deployment, and how such things as data encryption,
               digital certificates and other components could be built to
               optimize security and regulatory compliance for this effort and
               to apply to future efforts as part of a wider EA blueprint.
Presented by

	
  
“Most organizations’ enterprise IT architects find that they
                                                                              ”
               are constantly battling with the information
               security groups rather than truly consulting with them.”

               —CISO at regional healthcare provider.
               They translate IT security personnel’s natural caution as
               meaning that the group default is to just say no.




Presented by

	
  
Step 3: Start with Easily
                  Attainable Projects




               As this is probably the first time that groups ranging from
               security to development have collaborated from the start of
               a project, it’s advisable that the initial project not be a
               major business initiative. An easy win, or a couple of easier
               wins, in the beginning will help teams to learn how to work
               together and get processes right, and build a foundation of
               credibility and trust.



Presented by

	
  
Step 3: Start with Easily
                  Attainable Projects




               Consider small-in-scope projects, such as a focused
               departmental initiative. Examples include helping a team
               build security into the initial design of:
                 A mobile application for a select group of field workers.
                 A new database for emerging market customers.
                 A new e-commerce application dedicated to a particular
                  segment of B-to-B clients.


Presented by

	
  
“Whenever trying to effect organizational change, it's    ”
               always smart to start smaller, perfect those processes,
               and then apply them more broadly over time.”

               — Pete Lindstrom, Research Director at the market
               research firm Spire Security.




Presented by

	
  
Step 4: Evaluate Risks During
                  Planning & Design



               Enterprise architects should focus on ensuring that the group
               lets the security team do what it does best: find and
               evaluate risk. If it's a database front-end being deployed on
               tablets, as a simple example, have the security team do the
               vetting and report back to the enterprise architect and the team
               for remediation.




Presented by

	
  
Step 4: Evaluate Risks During
                  Planning & Design



               To rank risks and develop ways to mitigate them,
               ask the following questions:                                   ?
                 How might the deployment of new technologies potentially
                  introduce vulnerabilities and compromise workloads?
                 How is the data being collected and/or access classified?
                 What job roles are permitted access?
                 What credentials will be used for authentication?
                 Has the application code had a security review?
                 What industry or government regulations come into play?
Presented by

	
  
Step 5: Build Security Processes
                   Into Workflow


                 Over time, the practice of designing security into new
                  initiatives will become part of the organizational fabric.
                 Security, operations and the enterprise architect’s office will
                  learn how to work effectively together.
                 Processes will be put into place that will improve the overall
                  IT security of the organization.
                 Checkpoints will be put into place so that the risk posture of
                  new initiatives can be evaluated as they move from design
                  through production.
                 After a few successes and lessons learned, the processes and
Presented by
                  procedures put into place can be used throughout the
	
               organization on all new initiatives.
In Conclusion:                                                     :
               Security coordination driven from the enterprise architect will:

                 Help align security with business objectives.
                 Secure new initiatives more cost-effectively.
                 Develop successful security processes that can be replicated
                  throughout the organization.
                 Lead to a decline in the risk of data breaches.
                 Lead to an increase in regulatory compliance.



Presented by

	
  
The End-State:                                                   :
               “I firmly believe that having an enterprise architect who is a
               partner of the information security group (and vice versa)
               removes a number of barriers to the design and deployment of
               new solutions and allows them to be delivered quickly within
               policy guidelines and with acceptable levels of risk.”
                            —Enterprise architect, global engineering company




Presented by

	
  

Mais conteúdo relacionado

Mais procurados

Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introductionyuliana_mar
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security ResilienceJoel Aleburu
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general attSHIVA101531
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiSHIVA101531
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentConSanFrancisco123
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Security Operations Center
Security Operations CenterSecurity Operations Center
Security Operations CenterMDS CS
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Servicestsaiblake
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Bloxx
 
The NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkThe NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkEMMAIntl
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityPriyanka Aash
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuideAlienVault
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
From Business Architecture to Security Architecture
From Business Architecture to Security ArchitectureFrom Business Architecture to Security Architecture
From Business Architecture to Security ArchitecturePriyanka Aash
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 

Mais procurados (20)

Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introduction
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resi
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software Development
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Security Operations Center
Security Operations CenterSecurity Operations Center
Security Operations Center
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
 
The NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
From Business Architecture to Security Architecture
From Business Architecture to Security ArchitectureFrom Business Architecture to Security Architecture
From Business Architecture to Security Architecture
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 

Semelhante a Five Essential Enterprise Architecture Practices to Create the Security-Aware Enterprise

Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...UBM_Design_Central
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITYRazorpoint Security
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxelinoraudley582231
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Apoorva Ajmani
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesMighty Guides, Inc.
 
Dev week cloud world conf2021
Dev week cloud world conf2021Dev week cloud world conf2021
Dev week cloud world conf2021Archana Joshi
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdfJose R
 
Secure Soft Development Life Cycle .pptx
Secure Soft Development Life Cycle .pptxSecure Soft Development Life Cycle .pptx
Secure Soft Development Life Cycle .pptxOrlando Trajano
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up EMC
 
2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccessasundaram1
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldArun Prabhakar
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
111.pptx
111.pptx111.pptx
111.pptxJESUNPK
 

Semelhante a Five Essential Enterprise Architecture Practices to Create the Security-Aware Enterprise (20)

Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
Dev week cloud world conf2021
Dev week cloud world conf2021Dev week cloud world conf2021
Dev week cloud world conf2021
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Secure Soft Development Life Cycle .pptx
Secure Soft Development Life Cycle .pptxSecure Soft Development Life Cycle .pptx
Secure Soft Development Life Cycle .pptx
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
111.pptx
111.pptx111.pptx
111.pptx
 

Último

Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 

Último (20)

Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 

Five Essential Enterprise Architecture Practices to Create the Security-Aware Enterprise

  • 1. Five Essential Enterprise Architecture Practices to Create the Security-Aware Enterprise Presented by  
  • 2. The Enterprise Architect is : Ideally Positioned to Help Improve IT Security. Security efforts need to help the business achieve its objectives while reducing risk, whether the enterprise wants to:   Launch a new Web site.   Create a database.   Build a collaboration platform.   Embrace mobility.   Move to Cloud computing. Presented by  
  • 3. Everything with which the Enterprise Architect is charged speaks directly to business alignment–across technologies, workflows and roles! Presented by  
  • 4. The Enterprise Architect’s Charges* Include: :   Supporting enterprise goals.   Helping build and support business processes.   Enhancing organizational structure and culture.   Designing sustainable IT systems and applications. *All of which must be done with security in mind. Presented by  
  • 5. Business Alignment Falters When ! Security is Bolted on, not Built in.   Despite the importance of IT security in keeping data and enterprise systems secure and ensuring that the enterprise operates within regulatory compliance requirements, the tendency is to add security onto systems after they’ve been built.   Or worse, after they’ve been deployed. Presented by  
  • 6. The High Cost of Failure !   Generally, it is much more difficult to add security to a system after it has been designed or once deployed than it is to build it right to begin with.   Worse yet, bolt-on approaches are more likely to lead to costly security failures, such as breaches: High Price of a Security Failure Cost of a data breach $214 per compromised record Average cost per data breach event $7.2 million Source: Ponemon Institute U.S. Cost of a Data Breach report, 2011 Presented by  
  • 7. Driving Coordination, Effecting Change   Building inherently secure applications and systems requires tight, open and upfront coordination among many groups.   Enterprise architects are in the position to drive that coordination and effect the required change that depends on it.   Because their work is so integral to business alignment−and to driving the agility the enterprise requires to deliver better business service–enterprise architects have a firm understanding of how systems are being deployed, as well as knowledge of the business objectives behind these systems. Presented by  
  • 8. Thus:   The enterprise architect can drive value in aligning security teams, quality assurance teams, developers, the office of the CIO, and business managers and executives.   All those parties — in conjunction with the enterprise architect — must work together to ensure that the focus and resources necessary to maintain a secure IT posture are in place. Presented by  
  • 9. Still, This Won’t Be Easy . . . … This may be the first time all of these groups work together early in the solutions creation process. Expect tension. For instance:   Security teams may request certain controls that could seem onerous to others involved in the effort (including enterprise IT architects).   Developers may view security as a roadblock at times–and shun its input. Presented by  
  • 10. Taking the Lead, Breaking Bad Habits   59 percent of enterprise development teams are not following quality and security processes "rigorously" : when developing new software.   26 percent have few or no secure software     development processes.             Only 48 percent claim to follow audit procedures rigorously.   More than 70 percent felt that there was insufficient security guidance for key technology models such as cloud, virtualization, mobile devices and mainframes. Presented by Source: Creative Intellect Consulting, “The State of Secure Application Lifecycle Management.” The report was based on a survey of software development, IT and information security professionals around the world.  
  • 11. “We’d like to see organizations taking a multi-faceted ” approach to tackling the…security challenge. ‘Secure by Design and Practice’ should be the call to action adopted by organizations to address the software security challenge more directly.” —Bola Rotibi, founder of Creative Intellect Consulting Presented by  
  • 12. Five Essential Enterprise Architecture Practices to Create the Security-Aware Enterprise 1.  Get executive sponsorship. 2.  Foster a collaborative environment. 3.  Pick, at first, easily attainable projects. Presented by 4.  Evaluate security risks during planning & design.   5.  Build security processes into workflow.
  • 13. Step 1: Get Executive Sponsorship In order for enterprise architects to get security, operations and other teams to work cohesively together, it’s helpful to insert executive leadership into the process, so they can set business objectives and expectations across teams. Should security processes or communications break down, executive leadership can reiterate those processes’ importance to the business. Without such political cover, efforts can quickly fray and fall apart. Presented by  
  • 14. Step 1: Get Executive Sponsorship Setting the stage for the integration of security through the development process will change how new initiatives are built, and how the operations work together. Win political sponsorship to get started by:   Showing business leaders the threats against the company.   Demonstrating how integrating security into a product or application from the start can reduce risk.   Demonstrating areas where cost of securing systems can be reduced through integrating security processes with design. Presented by  
  • 15. Step 1: Get Executive Sponsorship This level of sponsorship should be easier today than it was just a few years ago, as security is reporting less often to the CIO’s office and increasingly to the board of directors. That’s a level of recognition for their work that can’t be ignored by any other groups associated with a project: Presented by  
  • 16. Step 1: Get Executive Sponsorship The Changing Reporting Structure for CISOs/Equivalent Information Security Leaders Source: PricewaterhouseCoopers LLP: 2011 Global State of Information Security Survey * This calculation measures the difference between response levels over a three-year period from 2007 to 2010. Presented by  
  • 17. Step 2: Foster a Collaborative Environment, Starting with the Security Team Encourage information security’s involvement as an enabler. Engage with the CISO’s office as a consultative resource to evaluate the business risk of new initiatives and have the staff propose alternatives for reducing that risk. Presented by  
  • 18. Step 2: Foster a Collaborative Environment, Starting with the Security Team What would collaboration entail? Example: A new application is to be built. The enterprise architect can bring the security team into the picture during the design phase to evaluate access controls, secure architecture and deployment, and how such things as data encryption, digital certificates and other components could be built to optimize security and regulatory compliance for this effort and to apply to future efforts as part of a wider EA blueprint. Presented by  
  • 19. “Most organizations’ enterprise IT architects find that they ” are constantly battling with the information security groups rather than truly consulting with them.” —CISO at regional healthcare provider. They translate IT security personnel’s natural caution as meaning that the group default is to just say no. Presented by  
  • 20. Step 3: Start with Easily Attainable Projects As this is probably the first time that groups ranging from security to development have collaborated from the start of a project, it’s advisable that the initial project not be a major business initiative. An easy win, or a couple of easier wins, in the beginning will help teams to learn how to work together and get processes right, and build a foundation of credibility and trust. Presented by  
  • 21. Step 3: Start with Easily Attainable Projects Consider small-in-scope projects, such as a focused departmental initiative. Examples include helping a team build security into the initial design of:   A mobile application for a select group of field workers.   A new database for emerging market customers.   A new e-commerce application dedicated to a particular segment of B-to-B clients. Presented by  
  • 22. “Whenever trying to effect organizational change, it's ” always smart to start smaller, perfect those processes, and then apply them more broadly over time.” — Pete Lindstrom, Research Director at the market research firm Spire Security. Presented by  
  • 23. Step 4: Evaluate Risks During Planning & Design Enterprise architects should focus on ensuring that the group lets the security team do what it does best: find and evaluate risk. If it's a database front-end being deployed on tablets, as a simple example, have the security team do the vetting and report back to the enterprise architect and the team for remediation. Presented by  
  • 24. Step 4: Evaluate Risks During Planning & Design To rank risks and develop ways to mitigate them, ask the following questions: ?   How might the deployment of new technologies potentially introduce vulnerabilities and compromise workloads?   How is the data being collected and/or access classified?   What job roles are permitted access?   What credentials will be used for authentication?   Has the application code had a security review?   What industry or government regulations come into play? Presented by  
  • 25. Step 5: Build Security Processes Into Workflow   Over time, the practice of designing security into new initiatives will become part of the organizational fabric.   Security, operations and the enterprise architect’s office will learn how to work effectively together.   Processes will be put into place that will improve the overall IT security of the organization.   Checkpoints will be put into place so that the risk posture of new initiatives can be evaluated as they move from design through production.   After a few successes and lessons learned, the processes and Presented by procedures put into place can be used throughout the   organization on all new initiatives.
  • 26. In Conclusion: : Security coordination driven from the enterprise architect will:   Help align security with business objectives.   Secure new initiatives more cost-effectively.   Develop successful security processes that can be replicated throughout the organization.   Lead to a decline in the risk of data breaches.   Lead to an increase in regulatory compliance. Presented by  
  • 27. The End-State: : “I firmly believe that having an enterprise architect who is a partner of the information security group (and vice versa) removes a number of barriers to the design and deployment of new solutions and allows them to be delivered quickly within policy guidelines and with acceptable levels of risk.” —Enterprise architect, global engineering company Presented by