Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Wardley mapping for cyber essentials - Open Security Summit 2019

98 views

Published on

For more information about this session at the Open Security Summit, please see https://open-security-summit.org/tracks/wardley-maps/

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Wardley mapping for cyber essentials - Open Security Summit 2019

  1. 1. EvolutionNovel Emergent Good Best Uncharted IndustrializedCyber Essentials certification Compliance line Patch Management Malware Protection Firewalls User access control Secure config
  2. 2. EvolutionNovel Emergent Good Best Uncharted Industrialized WinXP Compliance line Malware protection submap Malware Protection AV product Host OS Malware Strategy Anti-malware measures Win7 Win10 Mac OS McAfee TrendMicro Sophos Knowledge
  3. 3. EvolutionNovel Emergent Good Best Uncharted Industrialized Firewall Management Laptop Compliance line Firewall Management submap Apples to: web, email and application servers; desktop computers; laptop computers; tablets; mobile phones; firewalls; routers. Activity Practice Switch Desktop Router Juniper MX Boundary Firewall Cisco ASA Wireless Access Point Documented, assured and annually reviewed Transformed/reviewed in the last 12 months No documented assurance in the past 24 months
  4. 4. EvolutionNovel Emergent Good Best Uncharted Industrialized Process D IT Asset Mgt Process B App patching Patch Management Laptop Compliance line Patch Management submap Apples to: web, email and application servers; desktop computers; laptop computers; tablets; mobile phones; firewalls; routers. Switch Desktop Router Juniper MX Boundary Firewall Cisco ASA Wireless Access Point Removed when not needed Licensed and supported Component Patched within 14 days of critical Process A OS patching Process C Network device patching Process D IT Asset Mgt Process E Network Asset Mgt Process F Network device lifecycle
  5. 5. EvolutionNovel Emergent Good Best Uncharted Industrialized BYOD JIRA CRM Secure Configuration Laptop Smartphone Compliance line Secure Configuration submap Apples to: boundary firewalls; desktop computers; laptop computers; routers; servers. Activity Practice Switch Desktop Router Juniper MX Boundary Firewall Cisco ASA Wireless Access Point CIS Benchmark or similar applied Custom hardening or partial CIS No hardening assurance or insufficient hardening No current solution for hardening or MDM solution
  6. 6. EvolutionNovel Emergent Good Best Uncharted Industrialized Exchange Server Desktop Movers JIRA Smartphone CRM App MFA Admin-only accounts Joiners Leavers Compliance line User access control User access control submap In scope for: Email, Web servers, App servers, Desktops and Laptops, Smartphones and Tablets, BYOD SaaS and PaaS services not in scope Requirement Central Auth (Active Directory) Local auth
  7. 7. Term Symbol Meaning Component past or future(red) A single entity in a map e.g. an activity , practice , data ,or knowledge Interface / line of the present A connection between components Point of change How the map is changing e.g. competitive force Flow A flow of capital (e.g. risk, financial, physical, social) between components Inertia Likely to face a resistance to a change Line of the future How the map is anticipated to be Constraint A limitation from one component to another Market Formation of a competitive marketplace Ecosystem An ecosystem model e.g. ILC Accelerator / decelerator An attempt to alter the map Area of interest / focus / cell An area of interest, something worth noting e.g. components designated to a team Method Attitude build in-house with agile techniques use off the shelf products. Lean outsource to utility suppliers. Six Sigma Pioneers Settlers Town Planners

×