• Save
Information Security By Design
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Information Security By Design

on

  • 4,533 views

Information Security is becoming a focus for the entire enterprise, not just IT. This need to align both business and technology is forcing IT to move Information Security from afterthought to ...

Information Security is becoming a focus for the entire enterprise, not just IT. This need to align both business and technology is forcing IT to move Information Security from afterthought to forethought. Architects now ponder how Information Security can be integrated into the broader topic of Enterprise Architecture. This session shows how to make the integration happen. You will learn how to integrate assets and define trusts and threat models as a part of your overall EA plan. You will also understand how Information Security is traced all the way from business architecture to the technology implementation. Participants will understand the components of an Integrated EA and Information Security framework and ensuring the traceability between business goals and IT security solutions delivered from the framework.

Key Issues:
-Understand the need to think early about Information Security
-Learn to incorporate Information Security into your EA blueprint and roadmap
-Integrate Informatoin Security Goals, objectives and capabilities with your EA view of strategy
-Integrate security policies, services and mechanisms with your EA view of solutions
-Integrate security mechanisms, standards, and guidelines into your implementations

Statistics

Views

Total Views
4,533
Views on SlideShare
4,499
Embed Views
34

Actions

Likes
17
Downloads
0
Comments
1

6 Embeds 34

http://www.slideshare.net 12
http://unjobs.org 11
http://www.techgig.com 3
http://www.linkedin.com 3
https://www.linkedin.com 3
http://static.slidesharecdn.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • It's a good knowledge base
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Information Security By Design Presentation Transcript

  • 1. Information Security by Design Nalneesh Gaur, CISSP Diamond Management and Technology Consultants Nalneesh.gaur@diamondconsultants.com, April 10, 2008
  • 2. By the end of this course, you should be able to…  Understand the need to think early about Information Security  Learn how to align Information Security and business  Capture Information Security capabilities  Define security services and mechanisms  Apply an integrated Information Security EA framework to your practice Page 1
  • 3. Businesses are transforming to address information risks Management Pressure Points Transformational Change Numerous regulations Establishment of Chief and control standards Information Security Office (CISO) Distributed operations organization and and relationships governance structures Implementation of risk-based Development of risk intelligence Information Increased accountability Security roadmap Fragmented information Raise Awareness Establishment of security organization of the importance Information structure of information Security security and best Increased globalization, architecture practices crime and cyber terrorism Implementation of Heightened privacy controls and Purchase of Cyber- awareness among insurance reporting consumers automation Today’s topic Board-level visibility Page 2
  • 4. Information Security bridges the gap between Operational Risk and IT Security Operational Risk Areas Overarching framework for addressing risk Business Operations & Employee & Physical Business Financial Legal Regulatory Vendor External Process Culture Asset Continuity Reporting Information Security Areas Focuses on risk to information in all of the operational risk areas Systems Incident/Business Policy, Org & Asset Personnel Physical Security Development Comm. & Ops Compliance Continuity Governance Management Security /Access Control Life Management Cycle Examples of issues addressed - Financial Integrity, Trust, Fraud, Access Management, Intellectual Property, Privacy Technology IT Security Focuses on Information technology risks alone in all of the Information Security areas IT Threats Audits & Assessments Security Operations Controls e.g. Virus and Spyware, e.g. Penetration testing, e.g. Patch Applications, e.g. System Hardening, Hackers Security Assessments Provision User/Access Firewalls, Anti-virus Page 3
  • 5. To address information risks, the Enterprise Architect must align business, operational risk and technology CISO/CRO Business wants to wants to know know Enterprise Architect Are our assets protected? What is our exposure? How do we prevent the next attack? How do we comply with regulations? How much does it cost? Which controls do I prioritize? How do we improve security? How do I automate controls reporting? How do I gain executive buy-in? Technical Staff wants to know How do I prioritize between IT and Security? How do I integrate Security into the Infrastructure? How do I ensure consistency? Page 4
  • 6. But, roadblocks often thwart alignment  Information Security does not engage the business – Technology driven solutions “offered” to the business – Solutions looking for problems to solve – Organizational anomalies  Business strategy is too vague – Mission, vision, goals exist – Then what?  Complexity of the business – Do we plan for the whole enterprise?  Enterprise Architecture considered “too complexquot; and “too costly” Page 5
  • 7. Alignment can be achieved through collaboration on a business-driven plan  Business owns Business Architecture – Leadership (strategy & operations) – Business SMEs  Infosec Facilitates  Infosec owns  Business approves Solution Architecture (platform independent)  IT Security owns  Governed by Business and Technical Architecture Solution Architecture (infrastructure & processes) Suggested Approach Page 6
  • 8. The result is a business-capability driven blueprint that integrates business strategy, operational risks and Information Security solutions Components of a Security Blueprint Business Architecture Strategic Business Architecture (SBA) Security Specific Goals, Objectives and Capabilities Blueprint & Operational Business Architecture (OBA) Key Functions, Control Objectives, Trust Model Roadmap Solutions Architecture Security Privilege Security Policies Associations Services Technical Architecture Security Reference Security Standards Mechanisms Architecture and Guidelines Page 7
  • 9. Start by understanding the environment and security drivers  Understand the environment enablers and constraints  Understand the Security drivers – regulations, policies, business strategy, recent incidents, mergers and acquisitions  Determine the organizations appetite for Security – Sr. Mgmt commitment to security – Available resources: people, money – Management expectations  Involve business to develop guiding principles – A collection of position statements used to assist decision making – Positions unlikely to change over the next two to three years – Filters for decision-making . . . guidelines, not hard and fast rules Page 8
  • 10. Engage the business by documenting and driving additional detail into the business strategy Strategic Business Architecture (SBA)  A comprehensive statement covering the major functions and operations MISSION that the program addresses ENVIRONMENT, SECURITY DRIVERS &  An inspirational, forward-thinking view of what the program wants to VISION GUIDING PRINCIPLES achieve  The top priorities that would achieve the vision GOAL GOAL GOAL GOAL  A set of realistic outcomes tracked by performance indicators that PERFORMANCE OBJECTIVE collectively support goal attainment INDICATORS  A description of how the business CAPABILITIES plans to achieve the objectives  A description of what should be REQUIREMENTS implemented Page 9
  • 11. Engage the business by documenting and developing the details of the business operations Operational Business Architecture (OBA)  Entities  Trust Hierarchy Trust  Trust Domains Model Organization  Level 0/1 Functions  Capabilities Key Business Functions Mapping Context  Gap Analysis  Stakeholders  Information Risks Control  Likelihood and  Locations Impact Objectives  Control Standards Page 10
  • 12. Starting with the business context view, identify the organizational aspects and then the respective functions Level 0/1 Functions Capability Mapping Gap Analysis What it is Top-down description of level 0 and level 1 LOB functions. Each level has 5- 10 steps. Use it to assess any gap with detailed processes. These functional maps serve as inputs in understanding/defining trust relationships and control objectives. Trust Model Sample Deliverable How to do it Organization  Use IDEF-0 to develop Key Business Functions Context functional maps and relationships. IDEF-0 allows simple visualization of Input, Control Objectives Output, Controls and Mechanisms.  Define best-in-class, end-to- end IDEF-0 maps and definitions for relevant level 0 and level 1 business functions Level 0/1 Functions Page 11
  • 13. For each function map the SBA capabilities Level 0/1 Functions Capability Mapping Gap Analysis What it is Detailed mapping of SBA business capabilities to their supporting level 1 functions. Mapping assists in identifying capability gaps Trust Model Sample Deliverable How to do it Organization  Use a spreadsheet to organize Key Business Functions Context capabilities and then match functions to capabilities. Control  Examine the level 1 functions Objectives and identify the characteristics that enable the business capabilities (already captured from the SBA) Capabilities Mapping Page 12
  • 14. Identify gaps in capabilities by comparing the current and future capabilities Level 0/1 Functions Capability Mapping Gap Analysis What it is Observations, risks, implications and planned resolutions for capability gaps in functions Trust Model Sample Deliverable How to do it  Compare the high-level Organization Key Business functions with the current state Functions Context detailed functions  Identify new capabilities and Control Objectives the functions required to support them Gap Analysis Page 13
  • 15. Employ the knowledge of key functions to document and define the Trust Model – start by identifying the entities Entities Trust Hierarchy Trust Domains What it is An entity is a subject that takes an action in a business environment. Entities can be external (e.g. vendors, partners, customers) or internal (e.g. business units, employees). Trust Model Sample Deliverable How to do it Organization Use the key functions and Key Business Functions Context identify the subjects involved in those functions Control Objectives Entities Page 14
  • 16. Once the entities are known, identify the relationships and the specifics such as information exchanged between them Entities Trust Hierarchy Trust Domains What it is Trust Hierarchies are relationships and may be represented as One-Way vs. Two-Way, Transitive, External vs. Internal. Business involvement in identifying the relationship is critical. The trust hierarchy allows for discrimination between relationships Trust Model Sample Deliverable How to do it Organization  Identify the relationships Key Business Functions Context between the entities.  Document the type of Control information being exchanged Objectives across each relationship. Trust Hierarchy Page 15
  • 17. Develop trust domains by identifying common security themes Entities Trust Hierarchy Trust Domains What it is Trust Domains consist of entities and relationships that share a common security theme. Trust Domains are not a rigid construct, they are designed to make it easy to enforce security policies and may allow grouping of policies by domains. Trust Model Sample Deliverable How to do it Organization  Identify the unique security Key Business Functions Context characteristics of each entity and other entities that it interacts with to exchange Control Objectives information.  Group entities that share common security themes and depict the relationships between them to form the Trust domains. Trust Domains Page 16
  • 18. Develop Control Objectives by identifying the enterprise assets, threats and vulnerabilities Likelihood and Information Risks Control Standards Impact What it is Document Information risks (assets, threats and vulnerabilities) to prioritize protection measures. Use interviews to gather risk information across the business and from the interviewee’s vantage point. Trust Model Sample Deliverable How to do it Organization  Develop a model to score Key Business Functions Context assets based on plausible impact Control  Use interviews and key Objectives functions to identify assets, threats and vulnerabilities  Prioritize information assets to focus on the most valuable assets.  Identify the vulnerabilities, threats Information Risks Page 17
  • 19. Assess the impact and likelihood of the threat on assets to determine the greatest risks to the enterprise assets Likelihood and Information Risks Control Standards Impact What it is All risks are not created equal, assess the likelihood and impact of each risk. Prioritize the risks and then map capabilities to identify the capabilities that address the greatest risks first. Trust Model Sample Deliverable How to do it Organization  Identify the impacts and Key Business Functions Context likelihood of the threat to exploit the vulnerability. Control  Rank the assets, threats and Objectives vulnerabilities.  Focus on the greatest risks by plotting the assets, threats and vulnerabilities against likelihood and impact Likelihood and Impact Page 18
  • 20. Prioritize information risks and for each risk identify control standards Likelihood and Information Risks Control Standards Impact What it is Identify Control standards to address the greatest risks. Control Standards specify a desired end state and are platform agnostic. Control standards may be selected from ISO 270001, COBIT etc. Trust Model Sample Deliverable How to do it Organization  Identify the control standard Key Business Functions Context you wish to use  For each of the prioritized Control risks, identify applicable Objectives control standards  Consolidate risks that yield the exact same control objectives  Identify the frequently occurring standards to identify the priority control standards Control Standards Page 19
  • 21. The Strategic and Operational Business Architectures provide the necessary input for the Solution Architecture The Security Policies The Security are based on the OBA. Solution Architecture Mechanisms are Defines roles and profiles Policies are hierarchical mapped to Security within the organization. in nature and cross Services. They reference other policies Security represent different ways Policies of implementing the Technical Architecture services. Once Security Business Privilege Security Mechanisms are defined Architecture Model Mechanisms then a set of reference architecture can be built for each mechanism. The Security Reference reference architecture Services Architectures defines the organizations • The Security Services best practices for is a logical construct, implementing a given Security used as a stepping Security Mechanism. These are the platform Standards and stone to achieve specific technology Guidelines capabilities. standards and guidelines. Standards are linked to specific Security Policies. Page 20
  • 22. Engage policy, business and application owners to develop the solution architectures  Establish the policy catalog based on the SBA, OBA and the control objectives: – Local vs. global versions of policies – Driven by local regulations as well as unique business needs – Trust domain specific policies Solution  EA participates in policy development Architecture but does not own it. Security  Include clauses that can be enforced Policies immediately or in the near term Business Privilege Architecture Model  Privilege management forms the basis PRIVILEGE Security for any sophisticated Identity & Access ASSOCIATIONS Services Management solution. Asset Asset  Inventory existing roles and map Privilege Privilege individuals to those roles.  Engage business and application Profile Profile owners to develop an abstract construct such as “profiles”; Use profiles to map Roles Roles Roles organization roles. Individual Individual  The profiles can be used to grant access to assets Page 21
  • 23. Identify Security services and then develop its building blocks – security mechanisms Illustrative Technical Security Service Security Mechanism Architecture • Encryption Data Security • Security Digital Signatures mechanisms • Access Control in Transit • Integrity Verification Business Reference Architecture Architectures Encryption • Security Data Transformation • Standards and Data Security • Data Masking Guidelines at Rest Access Control • Integrity Verification • • Security Policies must be used to Host-Based Intrusion Protection • develop Security services Anti-Virus • Platform • The Security services vocabulary Platform Security Updates • should suggest a solution to a problem Security • Security services should be vetted Patch Management • with business and application owners to ensure they are usable Anti-Spam • • Security mechanisms must be Anti-Spyware • Messaging enhanced on a periodic basis to adapt Anti-Malware • to evolving risks Security Anti-Virus • • Security mechanisms may be reused Digital Signatures • across services and form the building blocks for services Page 22
  • 24. Complete the technical architecture by defining the remaining components Technical Architecture Security mechanisms Business Reference Architecture Architectures Security Standards and Guidelines • Reference Architectures are built for each • Standards are specific to a technology platform, security mechanism and define the specifics of a service, device or application. vendor solution, applicability, pros and cons • Temporary exception to the Standards must be • Reference Architectures must be periodically governed through the architecture governance updated to adapt to the evolving solutions process. landscape. Security Mechanisms Reference Architecture 1 Data Masking Reference Architecture n Page 23
  • 25. Use the Business and Solution Architectures to derive a roadmap of business capabilities Operational Business Architecture Strategic Business Architecture Solution Architecture 1H06 2H06 1H07 2H07 Capability 01 Theme 1 Capability 12 Capability 04 Capability 07 Roadmap of when Theme 2 each capability is Capability 09 delivered Capability 02 Capability 03 Theme 3 Capability 05 Capability 08 Business Capabilities Requiring Infosec ad IT Support Page 24
  • 26. Avoid some common pitfalls when building an Information Security Blueprint  Do not start with requirements, start with capabilities – Requirements are good for implementation but bog down the planning process – Capabilities provide a manageable level of detail for prioritization and release planning  Recognize Information Security as a key component of Operational Risk, work towards getting the OBA right – Start with key functions not processes for developing the OBA – Understand what you want to protect before deciding how you want to protect  Differentiate between IT security and Information Security, do not focus on technology alone – Hold off on tools until reference architecture Page 25
  • 27. Key Takeaways  Understand the significance of Information Security as a business enabler by identifying the drivers and appetite for Information Security early in the planning process  Information Security must engage the business by developing the – guiding principles – Strategic Business Architecture (SBA) – Operational Business Architecture (OBA)  Getting the Security Services right is the first step before developing the technical architecture artifacts  Develop Security Mechanisms and corresponding Reference Architectures for the highest priority Security services Page 26
  • 28. Thank You Questions? Page 27