SlideShare uma empresa Scribd logo
1 de 26
Adaptive Enterprise Security Architecture
John J. Czaplewski | Director of Professional Services | David Lynas Consulting, Ltd.
We build, deploy and operate …
Complex IT Systems
21 September 2016 David Lynas Consulting Ltd 2
Supported by …
Often
Not-So-Engineered Security
21 September 2016 David Lynas Consulting Ltd 3
Our technical security architectures focus on ...
Confidentiality, Integrity, Availability
and are becoming better and better
at adapting to dynamic threat environment
21 September 2016 David Lynas Consulting Ltd 4
But our Enterprises are concerned with much more:
21 September 2016 David Lynas Consulting Ltd 5
We need:
21 September 2016 David Lynas Consulting Ltd 6
a Framework and Methodology
for
Developing
Adaptive Enterprise Security Architectures
SABSA
21 September 2016 David Lynas Consulting Ltd 7
An internationally recognized methodology for:
• Developing risk-driven enterprise information security
and information assurance architectures
• Delivering security infrastructure solutions that support
and adapt to critical business initiatives.
SABSA
21 September 2016 David Lynas Consulting Ltd 8
• Begins with developing an understanding of key
enterprise business requirements,
• Transforms them into key business drivers for security
• Engineers the real business attributes that provide
the core supporting framework for an adaptive, living
enterprise security architecture
• Creates a chain of traceability from “Strategy &
Planning” through “Design’, “Implement” and
ongoing “Manage and Measure” to ensure that the
business mandate is preserved.
An Adaptive Enterprise Security Architecture
21 September 2016 David Lynas Consulting Ltd 9
Requires a comprehensive set of frameworks, models and methods
An Adaptive Enterprise Security Architecture:
Frames and Structures all Aspects of Enterprise Security
21 September 2016 David Lynas Consulting Ltd 10
An Adaptive Enterprise Security Architecture:
Manages all Aspects of Enterprise Security
21 September 2016 David Lynas Consulting Ltd 11
An Adaptive Enterprise Security Architecture:
Accountable Domain Authority
Develops Strategy and Plans
Sets Goals, Objectives & Expectations
Sets Performance Targets
Sets Risk Appetite
Sets Policy to Meet Objectives & Targets
Strategy & Planning Phase
Responsible Entities
Design Processes
Design Systems
Design Staffing Model
Design Controls & Enablers
Design
Establish Processes
Implement Systems
Appoint & Train People
Establish Controls & Enablers
Implement
Manage processes & operations
Manage people
Manage systems
Performance & Risk Monitoring
against KPIs and KRIs
Manage & Measure
Inform
of Responsibility
Report
Performance
& Compliance
With Target
Execute DesignTransition
Through-lifeAssurance
Higher Domain Authority
(Superdomain
Shareholders
Regulators)
Consult & Report Performance
Requires an Enterprise Security Architecture Governance Model
21 September 2016 David Lynas Consulting Ltd 12
An Adaptive Enterprise Security Architecture:
Defines Enterprise Security Architecture Capability Maturity Models
21 September 2016 David Lynas Consulting Ltd 13
Unreliable1
Informal2
Defined3
Monitored4
Optimised5
Assets
Motivation
Process
People
Location
Time
Contextual
Assets
Motivation
Process
People
Location
Time
Conceptual
Assets
Motivation
Process
People
Location
Time
Logical
Assets
Motivation
Process
People
Location
Time
Physical
Assets
Motivation
Process
People
Location
Time
Component
Assets
Motivation
Process
People
Location
Time
Service
Management
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
People
Time
Assets
Motivation
People
Time
Assets
Motivation
People
Time
Assets
Time
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
Location
ProcessProcess
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
People
Location
AssetsAssets
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
Time
Assets
Motivation
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
People
Location
Assets
People
Location
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
People
Time
Motivation
People
Time
People
Time
An Adaptive Enterprise Security Architecture:
Super Domain
Domain
A External
Impacted Domain
(customer)
Impacted
Peer Domain
C
Consult (C)
to define
policy &
target
C
C
Subdomain
External
Provider Domain
(service provider)
Inform (I)
policy &
target to
R domains
R
I
I
R
Inform (I*)
performance
to Super
&
Impacted
domains
I*
I*
I
Models Domain Roles and Responsibilities
21 September 2016 David Lynas Consulting Ltd 14
Risk Context
Assets
at Risk
Overall
likelihood
of loss
Likelihood of
threat
materialising
Likelihood of
weakness
exploited
Negative
Outcomes
Threats
Loss Event
Positive
Outcomes
Opportunities
Beneficial Event
Overall
loss
value
Asset
value
Negative
impact
value
Overall
benefit
value
Asset
value
Positive
impact
value
Overall
likelihood
of benefit
Likelihood of
opportunity
materialising
Likelihood of
strength
exploited
Analyses Threats and Opportunities
An Adaptive Enterprise Security Architecture:
21 September 2016 David Lynas Consulting Ltd 15
Understands and Communicates Technical Risk in Business Terms
An Adaptive Enterprise Security Architecture:
21 September 2016 David Lynas Consulting Ltd 16
An Adaptive Enterprise Security Architecture:
Creates Enterprise Policy Frameworks
Contextual Enterprise-wide Business Risk Policy
Conceptual
Policies for Enterprise-wide Risk & Opportunity Categories
Finance
Risk
Operational
Risk
Environment
Risk
Health &
Safety Risk
Information
Risk
Etc.
Logical
Policies for Logical
Domains
Policies for Logical
Domains
Policies for Logical
Domains
Physical
Procedures for Physical
Domains
Procedures for Physical
Domains
Procedures for Physical
Domains
Component
Standards for Nodes,
Addressed, Components
Standards for Nodes,
Addressed, Components
Standards for Nodes,
Addressed, Components
21 September 2016 David Lynas Consulting Ltd 17
David Lynas Consulting Ltd 18
An Adaptive Enterprise Security Architecture:
Business
Legislation
Process
Engineering
Methods
Business
Governance
Frameworks
Business
Sector
Regulation
Point of Primary
Integration for
any Standard
Requiring
measurable
Targets
Total Quality
Framework
Aligns and Integrates Business Requirements
21 September 2016
An Adaptive Enterprise Security Architecture:
Contextual: Meta-ProcessesVerticalSecurityConsistency
Horizontal Security Consistency
Conceptual: Strategic View of Process
Logical: Information Flows & Transformations
Physical: Data Flows & System Interactions
Component: Protocols
& Step Sequences
Delivers Top-Down, End-to-End Process Security
21 September 2016 David Lynas Consulting Ltd 19
An Adaptive Enterprise Security Architecture:
Derives Business-Linked Security Controls & Enablers
21 September 2016 David Lynas Consulting Ltd 20
An Adaptive Enterprise Security Architecture:
Builds Defence/Strength-in-Depth Control & Enablement Strategies
21 September 2016 David Lynas Consulting Ltd 21
David Lynas Consulting Ltd 22
An Adaptive Enterprise Security Architecture:
Technical
Controls
Management
Controls PCI
SOx
HIPAA
NIST
CobiT
ISO 27002
Integrates Controls Frameworks & Libraries
21 September 2016
David Lynas Consulting Ltd 23
An Adaptive Enterprise Security Architecture:
Develops Re-usable Operational Risk Management Architectures
Attributes
with performance targets & risk appetite thresholds
Risk Assessment
Ratings
Threat
Opportunity
Vulnerability
Strength
- Impact
+ Impact
Integrated Controls & Enablers Library – MTCS Modelled
Service 1
Mechanism 1
Component 1
Activity 1
Service 2
Mechanism 2
Component 2
Activity 2
Service 3
Mechanism 3
Component 3
Activity 3
21 September 2016
David Lynas Consulting Ltd 24
An Adaptive Enterprise Security Architecture:
Incorporates Business-Linked Risk Monitoring and Reporting Dashboards
21 September 2016
Risk Management
Attributes
Legal / Regulatory
Attributes
Access-controlled
Accountable
Assurable Enforceable
Compliant
Admissible
Business Attributes
Business Requirements
Business Drivers for Security
David Lynas Consulting Ltd 25
An Adaptive Enterprise Security Architecture:
Ensures the Enterprise Security Architecture Lives
21 September 2016
David Lynas Consulting Ltd 26
An Adaptive Enterprise Security Architecture:
• Security is about mitigating threats AND enabling
opportunities
• Change the security conversation to focus on
delivering value to the Enterprise
• Include security at the strategy and planning table
• Develop Enterprise Security Architecture that
enables the Enterprise to meet its mission, goals
and objectives
21 September 2016

Mais conteúdo relacionado

Mais procurados

Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitectureKris Kimmerle
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
SABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextSABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextDavid Sweigert
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSAcourses
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitecturePriyanka Aash
 
Security Modelling in ArchiMate
Security Modelling in ArchiMateSecurity Modelling in ArchiMate
Security Modelling in ArchiMatePECB
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationSeccuris Inc.
 
The Future of Security Architecture Certification
The Future of Security Architecture CertificationThe Future of Security Architecture Certification
The Future of Security Architecture Certificationdanb02
 
SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSAcourses
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterTuan Phan
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkTuan Phan
 

Mais procurados (20)

SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0
 
SABSA overview
SABSA overviewSABSA overview
SABSA overview
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part VI)_ver1-0SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part VI)_ver1-0
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
SABSA Implementation(Part V)_ver1-0
SABSA Implementation(Part V)_ver1-0SABSA Implementation(Part V)_ver1-0
SABSA Implementation(Part V)_ver1-0
 
SABSA white paper
SABSA white paperSABSA white paper
SABSA white paper
 
SABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextSABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 context
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes Profiling
 
SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part IV)_ver1-0SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part IV)_ver1-0
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Security Modelling in ArchiMate
Security Modelling in ArchiMateSecurity Modelling in ArchiMate
Security Modelling in ArchiMate
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
The Future of Security Architecture Certification
The Future of Security Architecture CertificationThe Future of Security Architecture Certification
The Future of Security Architecture Certification
 
SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summary
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 

Semelhante a Adaptive Enterprise Security Architecture

Realizing Software Security Maturity: The Growing Pains and Gains
Realizing Software Security Maturity: The Growing Pains and GainsRealizing Software Security Maturity: The Growing Pains and Gains
Realizing Software Security Maturity: The Growing Pains and GainsPriyanka Aash
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked inJohn Masiliunas
 
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersEnsuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersAlgoSec
 
INFOSECFORCE llc security services
INFOSECFORCE llc security servicesINFOSECFORCE llc security services
INFOSECFORCE llc security servicesBill Ross
 
Infosecforce security services
Infosecforce security servicesInfosecforce security services
Infosecforce security servicesBill Ross
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Pulse 2016 PPT - Adhir Mattu - 03012016 FINAL
Pulse 2016 PPT - Adhir Mattu - 03012016 FINALPulse 2016 PPT - Adhir Mattu - 03012016 FINAL
Pulse 2016 PPT - Adhir Mattu - 03012016 FINALAdhir Mattu
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld
 
Secure Data Center for Enterprise— Threat Management with NextGen IPS
Secure Data Center for Enterprise— Threat Management with NextGen IPSSecure Data Center for Enterprise— Threat Management with NextGen IPS
Secure Data Center for Enterprise— Threat Management with NextGen IPSCisco Russia
 
Building Highly Sophisticated Environments for Security and Compliance on AWS
Building Highly Sophisticated Environments for Security and Compliance on AWSBuilding Highly Sophisticated Environments for Security and Compliance on AWS
Building Highly Sophisticated Environments for Security and Compliance on AWSBoyan Dimitrov
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS
 
Buffalo Bills Training Camp
Buffalo Bills Training CampBuffalo Bills Training Camp
Buffalo Bills Training CampRolta AdvizeX
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programPriyanka Aash
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROPriyanka Aash
 
What affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsWhat affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsBill Burns
 
How to Build Security and Risk Management into Agile Environments
How to Build Security and Risk Management into Agile EnvironmentsHow to Build Security and Risk Management into Agile Environments
How to Build Security and Risk Management into Agile Environmentsdanb02
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Servicesxband
 

Semelhante a Adaptive Enterprise Security Architecture (20)

Realizing Software Security Maturity: The Growing Pains and Gains
Realizing Software Security Maturity: The Growing Pains and GainsRealizing Software Security Maturity: The Growing Pains and Gains
Realizing Software Security Maturity: The Growing Pains and Gains
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked in
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersEnsuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
 
INFOSECFORCE llc security services
INFOSECFORCE llc security servicesINFOSECFORCE llc security services
INFOSECFORCE llc security services
 
Infosecforce security services
Infosecforce security servicesInfosecforce security services
Infosecforce security services
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Pulse 2016 PPT - Adhir Mattu - 03012016 FINAL
Pulse 2016 PPT - Adhir Mattu - 03012016 FINALPulse 2016 PPT - Adhir Mattu - 03012016 FINAL
Pulse 2016 PPT - Adhir Mattu - 03012016 FINAL
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
 
Secure Data Center for Enterprise— Threat Management with NextGen IPS
Secure Data Center for Enterprise— Threat Management with NextGen IPSSecure Data Center for Enterprise— Threat Management with NextGen IPS
Secure Data Center for Enterprise— Threat Management with NextGen IPS
 
Building Highly Sophisticated Environments for Security and Compliance on AWS
Building Highly Sophisticated Environments for Security and Compliance on AWSBuilding Highly Sophisticated Environments for Security and Compliance on AWS
Building Highly Sophisticated Environments for Security and Compliance on AWS
 
The 10 best performing managed security service providers 2018
The 10 best performing managed security service providers 2018The 10 best performing managed security service providers 2018
The 10 best performing managed security service providers 2018
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Buffalo Bills Training Camp
Buffalo Bills Training CampBuffalo Bills Training Camp
Buffalo Bills Training Camp
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk program
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
What affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsWhat affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burns
 
How to Build Security and Risk Management into Agile Environments
How to Build Security and Risk Management into Agile EnvironmentsHow to Build Security and Risk Management into Agile Environments
How to Build Security and Risk Management into Agile Environments
 
Fix nix Pitch
Fix nix PitchFix nix Pitch
Fix nix Pitch
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Adaptive Enterprise Security Architecture

  • 1. Adaptive Enterprise Security Architecture John J. Czaplewski | Director of Professional Services | David Lynas Consulting, Ltd.
  • 2. We build, deploy and operate … Complex IT Systems 21 September 2016 David Lynas Consulting Ltd 2
  • 3. Supported by … Often Not-So-Engineered Security 21 September 2016 David Lynas Consulting Ltd 3
  • 4. Our technical security architectures focus on ... Confidentiality, Integrity, Availability and are becoming better and better at adapting to dynamic threat environment 21 September 2016 David Lynas Consulting Ltd 4
  • 5. But our Enterprises are concerned with much more: 21 September 2016 David Lynas Consulting Ltd 5
  • 6. We need: 21 September 2016 David Lynas Consulting Ltd 6 a Framework and Methodology for Developing Adaptive Enterprise Security Architectures
  • 7. SABSA 21 September 2016 David Lynas Consulting Ltd 7 An internationally recognized methodology for: • Developing risk-driven enterprise information security and information assurance architectures • Delivering security infrastructure solutions that support and adapt to critical business initiatives.
  • 8. SABSA 21 September 2016 David Lynas Consulting Ltd 8 • Begins with developing an understanding of key enterprise business requirements, • Transforms them into key business drivers for security • Engineers the real business attributes that provide the core supporting framework for an adaptive, living enterprise security architecture • Creates a chain of traceability from “Strategy & Planning” through “Design’, “Implement” and ongoing “Manage and Measure” to ensure that the business mandate is preserved.
  • 9. An Adaptive Enterprise Security Architecture 21 September 2016 David Lynas Consulting Ltd 9 Requires a comprehensive set of frameworks, models and methods
  • 10. An Adaptive Enterprise Security Architecture: Frames and Structures all Aspects of Enterprise Security 21 September 2016 David Lynas Consulting Ltd 10
  • 11. An Adaptive Enterprise Security Architecture: Manages all Aspects of Enterprise Security 21 September 2016 David Lynas Consulting Ltd 11
  • 12. An Adaptive Enterprise Security Architecture: Accountable Domain Authority Develops Strategy and Plans Sets Goals, Objectives & Expectations Sets Performance Targets Sets Risk Appetite Sets Policy to Meet Objectives & Targets Strategy & Planning Phase Responsible Entities Design Processes Design Systems Design Staffing Model Design Controls & Enablers Design Establish Processes Implement Systems Appoint & Train People Establish Controls & Enablers Implement Manage processes & operations Manage people Manage systems Performance & Risk Monitoring against KPIs and KRIs Manage & Measure Inform of Responsibility Report Performance & Compliance With Target Execute DesignTransition Through-lifeAssurance Higher Domain Authority (Superdomain Shareholders Regulators) Consult & Report Performance Requires an Enterprise Security Architecture Governance Model 21 September 2016 David Lynas Consulting Ltd 12
  • 13. An Adaptive Enterprise Security Architecture: Defines Enterprise Security Architecture Capability Maturity Models 21 September 2016 David Lynas Consulting Ltd 13 Unreliable1 Informal2 Defined3 Monitored4 Optimised5 Assets Motivation Process People Location Time Contextual Assets Motivation Process People Location Time Conceptual Assets Motivation Process People Location Time Logical Assets Motivation Process People Location Time Physical Assets Motivation Process People Location Time Component Assets Motivation Process People Location Time Service Management Assets Motivation Process People Location Time Assets Motivation Process People Time Assets Motivation People Time Assets Motivation People Time Assets Time Assets Motivation Process People Location Time Assets Motivation Process Location ProcessProcess Assets Motivation Process People Location Time Assets Motivation Process People Location AssetsAssets Assets Motivation Process People Location Time Assets Motivation Process People Location Time Assets Motivation Process People Location Time Assets Motivation Process Time Assets Motivation Assets Motivation Process People Location Time Assets Motivation Process People Location Assets People Location Assets Motivation Process People Location Time Assets Motivation Process People Location Time Assets Motivation Process People Time Motivation People Time People Time
  • 14. An Adaptive Enterprise Security Architecture: Super Domain Domain A External Impacted Domain (customer) Impacted Peer Domain C Consult (C) to define policy & target C C Subdomain External Provider Domain (service provider) Inform (I) policy & target to R domains R I I R Inform (I*) performance to Super & Impacted domains I* I* I Models Domain Roles and Responsibilities 21 September 2016 David Lynas Consulting Ltd 14
  • 15. Risk Context Assets at Risk Overall likelihood of loss Likelihood of threat materialising Likelihood of weakness exploited Negative Outcomes Threats Loss Event Positive Outcomes Opportunities Beneficial Event Overall loss value Asset value Negative impact value Overall benefit value Asset value Positive impact value Overall likelihood of benefit Likelihood of opportunity materialising Likelihood of strength exploited Analyses Threats and Opportunities An Adaptive Enterprise Security Architecture: 21 September 2016 David Lynas Consulting Ltd 15
  • 16. Understands and Communicates Technical Risk in Business Terms An Adaptive Enterprise Security Architecture: 21 September 2016 David Lynas Consulting Ltd 16
  • 17. An Adaptive Enterprise Security Architecture: Creates Enterprise Policy Frameworks Contextual Enterprise-wide Business Risk Policy Conceptual Policies for Enterprise-wide Risk & Opportunity Categories Finance Risk Operational Risk Environment Risk Health & Safety Risk Information Risk Etc. Logical Policies for Logical Domains Policies for Logical Domains Policies for Logical Domains Physical Procedures for Physical Domains Procedures for Physical Domains Procedures for Physical Domains Component Standards for Nodes, Addressed, Components Standards for Nodes, Addressed, Components Standards for Nodes, Addressed, Components 21 September 2016 David Lynas Consulting Ltd 17
  • 18. David Lynas Consulting Ltd 18 An Adaptive Enterprise Security Architecture: Business Legislation Process Engineering Methods Business Governance Frameworks Business Sector Regulation Point of Primary Integration for any Standard Requiring measurable Targets Total Quality Framework Aligns and Integrates Business Requirements 21 September 2016
  • 19. An Adaptive Enterprise Security Architecture: Contextual: Meta-ProcessesVerticalSecurityConsistency Horizontal Security Consistency Conceptual: Strategic View of Process Logical: Information Flows & Transformations Physical: Data Flows & System Interactions Component: Protocols & Step Sequences Delivers Top-Down, End-to-End Process Security 21 September 2016 David Lynas Consulting Ltd 19
  • 20. An Adaptive Enterprise Security Architecture: Derives Business-Linked Security Controls & Enablers 21 September 2016 David Lynas Consulting Ltd 20
  • 21. An Adaptive Enterprise Security Architecture: Builds Defence/Strength-in-Depth Control & Enablement Strategies 21 September 2016 David Lynas Consulting Ltd 21
  • 22. David Lynas Consulting Ltd 22 An Adaptive Enterprise Security Architecture: Technical Controls Management Controls PCI SOx HIPAA NIST CobiT ISO 27002 Integrates Controls Frameworks & Libraries 21 September 2016
  • 23. David Lynas Consulting Ltd 23 An Adaptive Enterprise Security Architecture: Develops Re-usable Operational Risk Management Architectures Attributes with performance targets & risk appetite thresholds Risk Assessment Ratings Threat Opportunity Vulnerability Strength - Impact + Impact Integrated Controls & Enablers Library – MTCS Modelled Service 1 Mechanism 1 Component 1 Activity 1 Service 2 Mechanism 2 Component 2 Activity 2 Service 3 Mechanism 3 Component 3 Activity 3 21 September 2016
  • 24. David Lynas Consulting Ltd 24 An Adaptive Enterprise Security Architecture: Incorporates Business-Linked Risk Monitoring and Reporting Dashboards 21 September 2016 Risk Management Attributes Legal / Regulatory Attributes Access-controlled Accountable Assurable Enforceable Compliant Admissible Business Attributes Business Requirements Business Drivers for Security
  • 25. David Lynas Consulting Ltd 25 An Adaptive Enterprise Security Architecture: Ensures the Enterprise Security Architecture Lives 21 September 2016
  • 26. David Lynas Consulting Ltd 26 An Adaptive Enterprise Security Architecture: • Security is about mitigating threats AND enabling opportunities • Change the security conversation to focus on delivering value to the Enterprise • Include security at the strategy and planning table • Develop Enterprise Security Architecture that enables the Enterprise to meet its mission, goals and objectives 21 September 2016