Service-Oriented Security Engineering

1,086 views

Published on

Published in: Technology, Business
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,086
On SlideShare
0
From Embeds
0
Number of Embeds
34
Actions
Shares
0
Downloads
2
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide
  • Service-Oriented Security Engineering

    1. 1. Service Oriented Security Engineering Richard Veryard
    2. 2. Security Is Sometimes Seen As A Challenge And Inhibitor For Enterprise SOA My product will make SOA safe. Is SOA safe? You can afford it. How much does it cost?
    3. 3. Decision Problems If I go ahead with this innovation, does it introduce new security risks and requirements? Should I abandon or postpone this innovation until the security issues are completely resolved? Risk Assessment How can I assemble a collection of security mechanisms and standards from different sources? Would I be better off acquiring everything from a single source? Integration Interoperability Should I adopt this standard, or insist that my suppliers conform to this standard? What does adoption entail? Standards How can I justify a given level of expenditure in security? How can I assess whether I am getting value-for-money from my investment in security? Business Case Do I need this class of security product? If so, how do I choose between the competing products in this class? What is a reasonable cost for this kind of product (direct and indirect)? Evaluation Comment Security Decision
    4. 4. Process Problems Disconnect between Functional Requirements and Non-Functional Requirements Disconnect between Business-Level and Detailed Security Requirements Piecemeal tool-driven approach to security No systematic business case for security. Tendency towards Cost-Avoidance rather than Risk/Reward Non-Functional Requirements as Afterthought
    5. 5. Why Security Doesn’t Remain Stationary Absolute Security My security is unaffected by what anyone else does. Relative Security I have to maintain at least as much security as everyone else. Innovation by other potential targets Innovation by attackers Responsive Security My security must respond to innovation by attackers. Agile Security My security should stay one step ahead of the game.
    6. 6. Layered Security Architecture (extract) Domain Services Stand-Alone Security Services Security in Platform Capability Services Business Transaction Risk and Compliance
    7. 7. Model-View-Controller Domain Services Security Services Security in Platform Capability Services Model View Controller
    8. 8. Multiple Entry Points Security Assessment Reviewing the levels of security contained in existing systems and artifacts (including models and plans) Security Implementation Implementing and activating a complete and consistent set of security policies and mechanisms Security Requirements Modeling the business and its ecosystem to determine detailed requirements and opportunities for (greater) security. Security Architecture Producing plans and portfolios that integrate security with other desired characteristics, including agility.
    9. 9. Security Lifecycle Runs Parallel with Service Engineering Lifecycle <ul><li>Security Requirements </li></ul><ul><li>Processes and assets needing protection </li></ul><ul><li>Abuse frames and misuse cases </li></ul><ul><li>Business Requirements </li></ul><ul><li>Business processes and assets </li></ul><ul><li>Requirements frames and use cases </li></ul><ul><li>Security Architecture </li></ul><ul><li>Risk analysis. Stability analysis </li></ul><ul><li>Security policies and mechanisms </li></ul><ul><li>Service Architecture </li></ul><ul><li>Layered service architecture </li></ul><ul><li>Security Provisioning </li></ul><ul><li>Fine-grained decomposition and implementation of security policies. </li></ul><ul><li>Testing misuse-cases </li></ul><ul><li>Service & Solution Provisioning </li></ul><ul><li>Service provisioning and test </li></ul><ul><li>Solution assembly and test </li></ul><ul><li>Security Operation </li></ul><ul><li>Monitoring and control security effectiveness. </li></ul><ul><li>Monitoring emerging threats </li></ul><ul><li>Service Operation </li></ul><ul><li>Monitoring and control service operations and business effectiveness </li></ul>
    10. 10. How the Security Schema follows a Generic Business Schema What the attacker does attack capability attack opportunity attack goal What the defender does defensive capability defensive action threat security goal What the business does capability response (unit of work) event outcome (goal) anti-requirements requirements generic schema
    11. 11. If you were intrigued by this presentation … <ul><li>For more of my stuff … </li></ul><ul><li>… read my blog </li></ul><ul><li>RVsoapbox.BlogSpot.com </li></ul><ul><li>… browse my articles </li></ul><ul><li>del.icio.us/richardveryard </li></ul><ul><li>For more on SOA … </li></ul><ul><li>… read the SOA Process blog </li></ul><ul><li>SOAprocess.BlogSpot.com </li></ul><ul><li>… and join the CBDI Forum </li></ul><ul><li>Bronze membership is free </li></ul><ul><li>Gold membership provides access to all articles </li></ul><ul><li>Platinum membership provides full access to knowledgebase </li></ul>www.cbdiforum.com

    ×