SlideShare uma empresa Scribd logo
1 de 13
A security enterprise architecture for SOA
George Georgovassilis
2
What is SOA?
- Applications expose functionality as services
- Services are composable
- Services implement APIs, are discoverable, consume and
modify resources and have a runtime behaviour
- Service APIs and resources are subject to security
considerations: who is allowed to do what?
3
A SOA platform
- Runtime environment for deploying, configuring, monitoring
and operating IT services
- Operational quality
- Security quality
- Out of scope: build process (dependency management, pen-
test, static code analysis of deployment artefacts)
4
Applicable security practices
- TOGAF 21.3 Guidance on Security for the Architecture
Domains
- ISO/IEC 17799:2005 establishing security practices
- OWASP
5
SOA platform aspects
People & processes
Business continuity
Technology
Services
Governance
6
Security aspects: business continuity
- Policies must be enforceable
- Cost and complexity manageable
- Risk management
- Contingency plans
- Availability, scalability
- Graceful service degradation
- Low MTTR
- DR class
7
Security aspects: people & proccesses
- HR and operational policies and processes documented,
maintained
- Personnel training, vetting
- Monitoring access, interactions, auditing
- Change management
- IAM (identity, roles, ownership, channels)
- ISO, security architect
8
Security aspects: technology
- Facility management
- Certification chain for hardware, OS, middleware
- Monitoring
- Change management, patch management
- Access control
9
Security aspects: services
- SDLC: deployment and configuration validation
- Certification chain for dependencies, build tools
- Monitoring
- Change management, patch management
- Access control
10
Security aspects: governance
- Audits, assurance
- Security drills
- Penetration tests
- Post mortems
- Actionable recommendations
- Risk management
11
Deliverables
- Security policy, roles, asset ownership, data classification,
system criticality classification
- Risk/threat analysis & mitigation
- Acknowledgement of laws & regulations
- Operational procedures, change management, data lifecycle
- Roadmap
- Signoff
12
management
network
application
network
Deployment context
Computing
hardware
OS
Virtualisation
Container middleware
Services
Monitoring
Fulfillment CIMDB
IAM
Service
discovery
API gateway
WAF
Antivirus
external
network
Clients
Clients
Storage
Ephemeral
storage
Gateway
Gateway
VPN
2FA
Backup Management
Storage
13
Example: provisioning VM
Requester Standard
Change
Issue
tracking
FulfillmentClient
IAM Virtualization
CIMDB

Mais conteúdo relacionado

Semelhante a Security architecture

محتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتمحتويات مادة آمن الشبكات
محتويات مادة آمن الشبكات
eng_SamMoh
 

Semelhante a Security architecture (20)

It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Layer 7: Enterprise Service Governance with SecureSpan
Layer 7: Enterprise Service Governance with SecureSpanLayer 7: Enterprise Service Governance with SecureSpan
Layer 7: Enterprise Service Governance with SecureSpan
 
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdfCISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
 
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and StandardsICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
 
Layer 7: Identity Enabled SOA Governance
Layer 7: Identity Enabled SOA GovernanceLayer 7: Identity Enabled SOA Governance
Layer 7: Identity Enabled SOA Governance
 
Sap security
Sap securitySap security
Sap security
 
CONIG® v1.5 Converged Information Governance
CONIG® v1.5 Converged Information GovernanceCONIG® v1.5 Converged Information Governance
CONIG® v1.5 Converged Information Governance
 
Conig® v1.5 Converged Information Governance
Conig® v1.5 Converged Information GovernanceConig® v1.5 Converged Information Governance
Conig® v1.5 Converged Information Governance
 
Pm Toolbox Nlr Final
Pm Toolbox Nlr FinalPm Toolbox Nlr Final
Pm Toolbox Nlr Final
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Framework
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our Time
 
محتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتمحتويات مادة آمن الشبكات
محتويات مادة آمن الشبكات
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
 

Último

➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...
Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...
Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...
 
Berhampur Call Girl 97487*63073 Call Girls in Berhampur Escort service book now
Berhampur  Call Girl 97487*63073 Call Girls in Berhampur Escort service book nowBerhampur  Call Girl 97487*63073 Call Girls in Berhampur Escort service book now
Berhampur Call Girl 97487*63073 Call Girls in Berhampur Escort service book now
 
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
 
Thane 💋 Call Girls 7091864438 Call Girls in Thane Escort service book now
Thane 💋 Call Girls 7091864438 Call Girls in Thane Escort service book nowThane 💋 Call Girls 7091864438 Call Girls in Thane Escort service book now
Thane 💋 Call Girls 7091864438 Call Girls in Thane Escort service book now
 
Raipur ❣️ Call Girl 97487*63073 Call Girls in Raipur Escort service book now
Raipur  ❣️ Call Girl 97487*63073 Call Girls in Raipur Escort service book nowRaipur  ❣️ Call Girl 97487*63073 Call Girls in Raipur Escort service book now
Raipur ❣️ Call Girl 97487*63073 Call Girls in Raipur Escort service book now
 
Nagpur ❤CALL GIRL 9874883814 ❤CALL GIRLS IN nagpur ESCORT SERVICE❤CALL GIRL I...
Nagpur ❤CALL GIRL 9874883814 ❤CALL GIRLS IN nagpur ESCORT SERVICE❤CALL GIRL I...Nagpur ❤CALL GIRL 9874883814 ❤CALL GIRLS IN nagpur ESCORT SERVICE❤CALL GIRL I...
Nagpur ❤CALL GIRL 9874883814 ❤CALL GIRLS IN nagpur ESCORT SERVICE❤CALL GIRL I...
 
Dehradun ❣️ Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
Dehradun ❣️  Call Girl 97487*63073 Call Girls in Dehradun Escort service book...Dehradun ❣️  Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
Dehradun ❣️ Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
 
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
 
Jodhpur Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
Jodhpur  Call Girl 97487*63073 Call Girls in Jodhpur Escort service book nowJodhpur  Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
Jodhpur Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
 
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book nowIndore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
 
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book nowPatna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
 
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL I...
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL I...Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL I...
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL I...
 
Udupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort serviceUdupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort service
 
Digha Call Girl Service 97487*63073 Call Girls in Digha Escort service book...
Digha  Call Girl Service 97487*63073 Call Girls in Digha  Escort service book...Digha  Call Girl Service 97487*63073 Call Girls in Digha  Escort service book...
Digha Call Girl Service 97487*63073 Call Girls in Digha Escort service book...
 
NAGPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
NAGPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICENAGPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
NAGPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service
 
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL IN
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL INBhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL IN
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL IN
 
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
 
UJJAIN CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
UJJAIN CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICEUJJAIN CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
UJJAIN CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book nowMysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
 

Security architecture

  • 1. A security enterprise architecture for SOA George Georgovassilis
  • 2. 2 What is SOA? - Applications expose functionality as services - Services are composable - Services implement APIs, are discoverable, consume and modify resources and have a runtime behaviour - Service APIs and resources are subject to security considerations: who is allowed to do what?
  • 3. 3 A SOA platform - Runtime environment for deploying, configuring, monitoring and operating IT services - Operational quality - Security quality - Out of scope: build process (dependency management, pen- test, static code analysis of deployment artefacts)
  • 4. 4 Applicable security practices - TOGAF 21.3 Guidance on Security for the Architecture Domains - ISO/IEC 17799:2005 establishing security practices - OWASP
  • 5. 5 SOA platform aspects People & processes Business continuity Technology Services Governance
  • 6. 6 Security aspects: business continuity - Policies must be enforceable - Cost and complexity manageable - Risk management - Contingency plans - Availability, scalability - Graceful service degradation - Low MTTR - DR class
  • 7. 7 Security aspects: people & proccesses - HR and operational policies and processes documented, maintained - Personnel training, vetting - Monitoring access, interactions, auditing - Change management - IAM (identity, roles, ownership, channels) - ISO, security architect
  • 8. 8 Security aspects: technology - Facility management - Certification chain for hardware, OS, middleware - Monitoring - Change management, patch management - Access control
  • 9. 9 Security aspects: services - SDLC: deployment and configuration validation - Certification chain for dependencies, build tools - Monitoring - Change management, patch management - Access control
  • 10. 10 Security aspects: governance - Audits, assurance - Security drills - Penetration tests - Post mortems - Actionable recommendations - Risk management
  • 11. 11 Deliverables - Security policy, roles, asset ownership, data classification, system criticality classification - Risk/threat analysis & mitigation - Acknowledgement of laws & regulations - Operational procedures, change management, data lifecycle - Roadmap - Signoff
  • 12. 12 management network application network Deployment context Computing hardware OS Virtualisation Container middleware Services Monitoring Fulfillment CIMDB IAM Service discovery API gateway WAF Antivirus external network Clients Clients Storage Ephemeral storage Gateway Gateway VPN 2FA Backup Management Storage
  • 13. 13 Example: provisioning VM Requester Standard Change Issue tracking FulfillmentClient IAM Virtualization CIMDB