SlideShare a Scribd company logo
1 of 30
Modelling Security
Architecture
Narendra Ramakrishna
COSAC 2016
4th October 2016
S | E | A | M
Advisory and Consulting
Objective
 SABSA provides an excellent framework for business-driven Enterprise
Security Architecture and Design. Aspects such as business attributes
profile, domains and the trust modelling are something that the industry
has not witnessed in most other architecture frameworks. Although
there have been attempts to “model” security architecture with boxes,
lines, ellipses and circles, there is voidness in the area of modelling
enterprise security architecture that the industry could use and
potentially align with other architectural notations such as Archimate or
in the design land, UML.
 The intent of the paper is to propose a simple yet comprehensive
technique to model enterprise security architecture and design aligned
to SABSA that enables –
 Standardisation of SABSA Enterprise Security Architecture framework by formalizing
common language used in the form of ESA modelling notation
 Reusability of model artefacts (not documents) to enable enterprise and department
level collaboration and knowledge management
 Generic or organisation specific Library of assets for various ESA artefacts such as –
Business attribute profile(s), security services, mechanisms and components and
associated views
 Tool-assisted development using a separate toolbox for ESA that augments Enterprise
Architecture (ToGAF) modelling using Archimate
http://www.cosac.net/synopsis.html#2S
S | E | A | M
Advisory and Consulting
SABSA artefacts for
modelling security
architecture
 Model, Stakeholder Concerns and Viewpoints
 SABSA Meta-Model
S | E | A | M
Advisory and Consulting
Why a Modelling Notation for
SABSA?
Standardisation
ReuseContent Library
Standardisation enables
a common vocabulary
used in the form of SABSA
notation
Reusability of model
artefacts (not documents) to
reduce rework thereby
increasing throughput of
architecture and design
deliverables for business
projects
Enables generic or
organisation specific Library
of assets for various ESA
artefacts such as – Business
attribute profile(s), security
services, mechanisms and
components, domains and
associated views
S | E | A | M
Advisory and Consulting
5-minute overview of Model-View and
Viewpoints
Reference: ISO/IEC 42010:2011 - Systems and software engineering — Architecture description
’I am a CIO, I need to see
overview of the system to
present to the executive; don’t
give me the details‘
’I am a CEO, could you give me
a picture of how users would
use the system?‘
’I am a system designer, could I
get the interfaces that are
impacted?‘
’I am from operations, what
processes are you impacting?‘
CONCERN: Overview of impacted systems
CONCERN: Usage of the System
CONCERN: Impact on processes
CONCERN: System Architecture
Stakeholders and Concerns Viewpoints View (one or
more diagram)
Model
Repository
Deliverables
S | E | A | M
Advisory and Consulting
SABSA Meta-Model
Business Attribute
Approach to
derive business
drivers from
capabilities
Approach to
derive business
drivers from asset
register
Approach to
derive business
drivers from
business
requirement
We will see later
how this manifest
in reality
S | E | A | M
Advisory and Consulting
SABSA Meta-Model
SABSA Domain
Sub-domains
exists within a
domain
Trust
Relationships
could be
unilateral or
bilateral
Each domain
contains its own
Business Attribute
Profile
S | E | A | M
Advisory and Consulting
SABSA Meta-Model
Risk Model
Could be sourced
from popular
Threat
Intelligence
sources. STIX,
TAXI and CybOx
evolving as
popular formats
Control
Objectives from
ISF is used in our
case
S | E | A | M
Advisory and Consulting
SABSA Meta-Model
SABSA Controls
Process Model
might exist for
Physical and
Component Layers
also. Our case is
limited to Logical
Architecture.
The case makes
use of OSA
controls
S | E | A | M
Advisory and Consulting
Modelling Security
Architecture
 Key aspects of SABSA Modelled
S | E | A | M
Advisory and ConsultingExample Used: PSD/2 for Banks
 What is PSD/2?
 Extension to European Payments Service Directive with
significant changes
 Aspires to establish a level playing field for financial institutions
 Simplifies financial transactions for customers with use cases
such as unified accounts management, single payments
application etc. along with number of other use cases.
 Before and After PSD/2 – Account Information
Bank 1 App
Bank 1 App
Bank 1 App
BEFORE PSD/2
Third
Party
App
AFTER PSD/2 Accounting
Information Service
Providers [AISP]
https://openbankproject.com
S | E | A | M
Advisory and ConsultingExample Used: PSD/2 for Banks
 What is PSD/2?
 Extension to European Payments Service Directive with
significant changes
 Aspires to establish a level playing field for financial institutions
 Simplifies financial transactions for customers with use cases
such as unified accounts management, single payments
application etc. along with number of other use cases.
 Before and After PSD/2 – Payment Information
AFTER PSD/2BEFORE PSD/2
Acquirer
Card Payments
Service ProviderIssuer
Customer’s
Bank
Issuer
Customer’s
Bank
S | E | A | M
Advisory and Consulting
Are we modelling PSD/2
Architecture fully?
 This is for illustration ONLY
 The modelling reflects salient features of SABSA that
other notations don’t support out-of-box
 So, what are we modelling?
 Contextual Architecture – mainly uses Archimate 2.0 –
Motivation Extensions; we will do ‘Risk Modelling’
[Business Risks]
 Conceptual Architecture – key modelling illustrates
Business Attribute Profile, Control Objectives [Library] and
Domain modelling
 Logical Architecture – main focus is on Security Services,
alignment of Security Services with process modelling and
Trust Modelling
S | E | A | M
Advisory and Consulting
Our Setup for Modelling
Architecture
• Contextual
• Threats Catalogue
• Conceptual
• Business Attribute Profile
• Control Objectives
Library
• SABSA Domains
• Business
Attributes
• Risk Model
• Policy
Architecture
• Control
Objectives
• Sub-Domains
• Logical
• Security Services
• Security Mechanisms
• Security Components
PSD/2
Other Projects
External
Data
Sources
Reusable AssetsBusiness Projects
Effective Deployment is to
provision this on a Database
Views
(diagrams,
tables etc.)
Views
(diagrams,
tables etc.)
Project
Deliverables
Create
Views
Update
Assets
Sync
Assets
S | E | A | M
Advisory and Consulting
In the tool …
Business
Projects
Reusable
Assets
Example Import
from external
sources
S | E | A | M
Advisory and Consulting
Contextual Architecture
Mainly focusing on Risk Model [Threats]
S | E | A | M
Advisory and Consulting
SABSA – Contextual Layer
 Business Risk Model
Risk Model
Opportunities Threats Model
Threats
Inventory
Threat Scenario
Opportunities
Inventory
Opportunities
Scenario
• Threat Agents
• Relevant Threats
• …
S | E | A | M
Advisory and Consulting
In the tool …
Hierarchy as
per previous
slide
Modelling is NOT just
diagrams, diagram
elements and
relationships – it is
communication tool
expected to communicate
design intent with clarity.
If description is needed,
put it in the diagram
notes. It gets published
when documents are
published from the
model.
Master Threat
information
resides in
Reusable
Assets.
Frequent
updates to
threat
information
possible.
Reference: Threat Intelligence
Sharing using STIX and TAXII
S | E | A | M
Advisory and Consulting
Contextual Architecture
Other Views
Business Model [Assets] Business Capabilities [Process Inventory]
Organisation Structure [People] Business Geography [Location] Business Time Dependencies [Time]
S | E | A | M
Advisory and Consulting
Conceptual Architecture
Business Attributes Profile, Control Objectives and
Domains
S | E | A | M
Advisory and ConsultingBusiness Attribute Profile
Refer to meta-model slides between slides 5 and 8
It is a good idea to host ‘Business Attribute Profile
Template’ in reusable assets. All domains could use
it as a starting point.
Impacted Business Attributes
SABSA Properties of
Business Attributes
NOTE: The profile
provided with the
package need to be
imported into the tool
for these to appear.
S | E | A | M
Advisory and ConsultingTraceability from Contextual elements to
Business Attributes
If the relationships exist, they appear
when the elements are drag-and-
dropped into a diagram.
Trace relationship can produce
traceability in a tabular form.
S | E | A | M
Advisory and Consulting
Control Objectives
Control
Objective
Library – ISF
2016 SoGP
Control
Objectives
Principle and
Objective as
described by
ISF SoGP can
also be
imported
SoGP = Standard of Good Practice
Control Objectives
from any standards
could be imported
S | E | A | M
Advisory and ConsultingLinking Control Objectives to Business
Attributes
Tags are the best way
to specify additional,
context-specific
information without
impacting model
integrity.
However, tooling
vendors seems to
support tags in
multiple ways.
Trace relationships
could automatically
provide relationship
matrix [tool
dependent].
S | E | A | M
Advisory and ConsultingSABSA Domain – As container
So far, reusable assets just held catalogues. SABSA domains provides the first view
of Reusable Reference Architecture contextualised to a specific organisation.
S | E | A | M
Advisory and Consulting
Logical Architecture
Trust Model, Security Services and Usage of Security
Services
S | E | A | M
Advisory and Consulting
Trust Model
Functional Interactions Trust expressed through usage of Business Attributes and
Trust Relationships
Work in progress in this area to develop a better SABSA notation
S | E | A | M
Advisory and Consulting
Security Services
Used in same spirit as SOA Services (one of the use cases)
S | E | A | M
Advisory and Consulting
Security Services
Used in same spirit as SOA Services (one of the use cases)
S | E | A | M
Advisory and Consulting
Traceability
From business attributes to security services

More Related Content

What's hot

Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Craig Martin
 

What's hot (20)

SABSA Implementation(Part V)_ver1-0
SABSA Implementation(Part V)_ver1-0SABSA Implementation(Part V)_ver1-0
SABSA Implementation(Part V)_ver1-0
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
 
Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architecture
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Adaptive Enterprise Security Architecture
Adaptive Enterprise Security ArchitectureAdaptive Enterprise Security Architecture
Adaptive Enterprise Security Architecture
 
SABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextSABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 context
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part IV)_ver1-0SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part IV)_ver1-0
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes Profiling
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
SABSA white paper
SABSA white paperSABSA white paper
SABSA white paper
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
Zachman Enterprise Security Architecture
Zachman Enterprise Security ArchitectureZachman Enterprise Security Architecture
Zachman Enterprise Security Architecture
 

Viewers also liked

Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
Rahul Mohandas
 

Viewers also liked (16)

SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summary
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
Designing Virtual Network Security Architectures
Designing Virtual Network Security ArchitecturesDesigning Virtual Network Security Architectures
Designing Virtual Network Security Architectures
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture Approach
 
SABSA - TOGAF Integration White Paper
SABSA - TOGAF Integration White PaperSABSA - TOGAF Integration White Paper
SABSA - TOGAF Integration White Paper
 
DWS16 - Smart city forum - Niels De Schutter, Atos
DWS16 - Smart city forum - Niels De Schutter, AtosDWS16 - Smart city forum - Niels De Schutter, Atos
DWS16 - Smart city forum - Niels De Schutter, Atos
 
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
 
Web application security: how to start?
Web application security: how to start?Web application security: how to start?
Web application security: how to start?
 
Ea Relationship To Security And The Enterprise V1
Ea Relationship To Security And The Enterprise V1Ea Relationship To Security And The Enterprise V1
Ea Relationship To Security And The Enterprise V1
 
IoT And Inevitable Decentralization of The Internet
IoT And Inevitable Decentralization of The InternetIoT And Inevitable Decentralization of The Internet
IoT And Inevitable Decentralization of The Internet
 
Patterns and Antipatterns in Enterprise Security
Patterns and Antipatterns in Enterprise SecurityPatterns and Antipatterns in Enterprise Security
Patterns and Antipatterns in Enterprise Security
 
The End of the Fortress: The new Approach to Cybersecurity
The End of the Fortress: The new Approach to CybersecurityThe End of the Fortress: The new Approach to Cybersecurity
The End of the Fortress: The new Approach to Cybersecurity
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 

Similar to Modelling Security Architecture

Week 2-What is Enterprise Architecure (1).pptx
Week 2-What is Enterprise Architecure (1).pptxWeek 2-What is Enterprise Architecure (1).pptx
Week 2-What is Enterprise Architecure (1).pptx
RizalPrambudi3
 

Similar to Modelling Security Architecture (20)

EA and SOA
EA and SOAEA and SOA
EA and SOA
 
Saibm
SaibmSaibm
Saibm
 
Architecting and Designing Enterprise Applications
Architecting and Designing Enterprise ApplicationsArchitecting and Designing Enterprise Applications
Architecting and Designing Enterprise Applications
 
Introduction to SOFTWARE ARCHITECTURE
Introduction to SOFTWARE ARCHITECTUREIntroduction to SOFTWARE ARCHITECTURE
Introduction to SOFTWARE ARCHITECTURE
 
System Architect and Rhapsody
System Architect and RhapsodySystem Architect and Rhapsody
System Architect and Rhapsody
 
Are You an Accidental or Intentional Architect?
Are You an Accidental or Intentional Architect?Are You an Accidental or Intentional Architect?
Are You an Accidental or Intentional Architect?
 
Enterprise Architecture as a Competitive Advantage in the MarkITS
Enterprise Architecture as a Competitive Advantage in the MarkITSEnterprise Architecture as a Competitive Advantage in the MarkITS
Enterprise Architecture as a Competitive Advantage in the MarkITS
 
Are You an Accidental or Intention Software Architect
Are You an Accidental or Intention Software ArchitectAre You an Accidental or Intention Software Architect
Are You an Accidental or Intention Software Architect
 
Week 2-What is Enterprise Architecure (1).pptx
Week 2-What is Enterprise Architecure (1).pptxWeek 2-What is Enterprise Architecure (1).pptx
Week 2-What is Enterprise Architecure (1).pptx
 
[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture
 
Collecting and analyzing data for valuable decision making in a service orien...
Collecting and analyzing data for valuable decision making in a service orien...Collecting and analyzing data for valuable decision making in a service orien...
Collecting and analyzing data for valuable decision making in a service orien...
 
Practice EA in three tiers
Practice EA in three tiersPractice EA in three tiers
Practice EA in three tiers
 
Service Oriented & Model Driven Architectures
Service Oriented & Model Driven ArchitecturesService Oriented & Model Driven Architectures
Service Oriented & Model Driven Architectures
 
SSAS RLS Prototype | Vision and Scope Document
SSAS RLS Prototype | Vision and Scope DocumentSSAS RLS Prototype | Vision and Scope Document
SSAS RLS Prototype | Vision and Scope Document
 
[2016/2017] Introduction to Software Architecture
[2016/2017] Introduction to Software Architecture[2016/2017] Introduction to Software Architecture
[2016/2017] Introduction to Software Architecture
 
Technical Architecture
Technical ArchitectureTechnical Architecture
Technical Architecture
 
[2017/2018] Introduction to Software Architecture
[2017/2018] Introduction to Software Architecture[2017/2018] Introduction to Software Architecture
[2017/2018] Introduction to Software Architecture
 
(ONLINE) ITIL Indonesia Community - Sinergi ITSM dan Enterprise Architecture
(ONLINE) ITIL Indonesia Community - Sinergi ITSM dan Enterprise Architecture(ONLINE) ITIL Indonesia Community - Sinergi ITSM dan Enterprise Architecture
(ONLINE) ITIL Indonesia Community - Sinergi ITSM dan Enterprise Architecture
 
Information management
Information managementInformation management
Information management
 
Smart Client Software Factory 2010
Smart Client Software Factory  2010Smart Client Software Factory  2010
Smart Client Software Factory 2010
 

Recently uploaded

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
laloo_007
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 

Recently uploaded (20)

Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 

Modelling Security Architecture

  • 2. S | E | A | M Advisory and Consulting Objective  SABSA provides an excellent framework for business-driven Enterprise Security Architecture and Design. Aspects such as business attributes profile, domains and the trust modelling are something that the industry has not witnessed in most other architecture frameworks. Although there have been attempts to “model” security architecture with boxes, lines, ellipses and circles, there is voidness in the area of modelling enterprise security architecture that the industry could use and potentially align with other architectural notations such as Archimate or in the design land, UML.  The intent of the paper is to propose a simple yet comprehensive technique to model enterprise security architecture and design aligned to SABSA that enables –  Standardisation of SABSA Enterprise Security Architecture framework by formalizing common language used in the form of ESA modelling notation  Reusability of model artefacts (not documents) to enable enterprise and department level collaboration and knowledge management  Generic or organisation specific Library of assets for various ESA artefacts such as – Business attribute profile(s), security services, mechanisms and components and associated views  Tool-assisted development using a separate toolbox for ESA that augments Enterprise Architecture (ToGAF) modelling using Archimate http://www.cosac.net/synopsis.html#2S
  • 3. S | E | A | M Advisory and Consulting SABSA artefacts for modelling security architecture  Model, Stakeholder Concerns and Viewpoints  SABSA Meta-Model
  • 4. S | E | A | M Advisory and Consulting Why a Modelling Notation for SABSA? Standardisation ReuseContent Library Standardisation enables a common vocabulary used in the form of SABSA notation Reusability of model artefacts (not documents) to reduce rework thereby increasing throughput of architecture and design deliverables for business projects Enables generic or organisation specific Library of assets for various ESA artefacts such as – Business attribute profile(s), security services, mechanisms and components, domains and associated views
  • 5. S | E | A | M Advisory and Consulting 5-minute overview of Model-View and Viewpoints Reference: ISO/IEC 42010:2011 - Systems and software engineering — Architecture description ’I am a CIO, I need to see overview of the system to present to the executive; don’t give me the details‘ ’I am a CEO, could you give me a picture of how users would use the system?‘ ’I am a system designer, could I get the interfaces that are impacted?‘ ’I am from operations, what processes are you impacting?‘ CONCERN: Overview of impacted systems CONCERN: Usage of the System CONCERN: Impact on processes CONCERN: System Architecture Stakeholders and Concerns Viewpoints View (one or more diagram) Model Repository Deliverables
  • 6. S | E | A | M Advisory and Consulting SABSA Meta-Model Business Attribute Approach to derive business drivers from capabilities Approach to derive business drivers from asset register Approach to derive business drivers from business requirement We will see later how this manifest in reality
  • 7. S | E | A | M Advisory and Consulting SABSA Meta-Model SABSA Domain Sub-domains exists within a domain Trust Relationships could be unilateral or bilateral Each domain contains its own Business Attribute Profile
  • 8. S | E | A | M Advisory and Consulting SABSA Meta-Model Risk Model Could be sourced from popular Threat Intelligence sources. STIX, TAXI and CybOx evolving as popular formats Control Objectives from ISF is used in our case
  • 9. S | E | A | M Advisory and Consulting SABSA Meta-Model SABSA Controls Process Model might exist for Physical and Component Layers also. Our case is limited to Logical Architecture. The case makes use of OSA controls
  • 10. S | E | A | M Advisory and Consulting Modelling Security Architecture  Key aspects of SABSA Modelled
  • 11. S | E | A | M Advisory and ConsultingExample Used: PSD/2 for Banks  What is PSD/2?  Extension to European Payments Service Directive with significant changes  Aspires to establish a level playing field for financial institutions  Simplifies financial transactions for customers with use cases such as unified accounts management, single payments application etc. along with number of other use cases.  Before and After PSD/2 – Account Information Bank 1 App Bank 1 App Bank 1 App BEFORE PSD/2 Third Party App AFTER PSD/2 Accounting Information Service Providers [AISP] https://openbankproject.com
  • 12. S | E | A | M Advisory and ConsultingExample Used: PSD/2 for Banks  What is PSD/2?  Extension to European Payments Service Directive with significant changes  Aspires to establish a level playing field for financial institutions  Simplifies financial transactions for customers with use cases such as unified accounts management, single payments application etc. along with number of other use cases.  Before and After PSD/2 – Payment Information AFTER PSD/2BEFORE PSD/2 Acquirer Card Payments Service ProviderIssuer Customer’s Bank Issuer Customer’s Bank
  • 13. S | E | A | M Advisory and Consulting Are we modelling PSD/2 Architecture fully?  This is for illustration ONLY  The modelling reflects salient features of SABSA that other notations don’t support out-of-box  So, what are we modelling?  Contextual Architecture – mainly uses Archimate 2.0 – Motivation Extensions; we will do ‘Risk Modelling’ [Business Risks]  Conceptual Architecture – key modelling illustrates Business Attribute Profile, Control Objectives [Library] and Domain modelling  Logical Architecture – main focus is on Security Services, alignment of Security Services with process modelling and Trust Modelling
  • 14. S | E | A | M Advisory and Consulting Our Setup for Modelling Architecture • Contextual • Threats Catalogue • Conceptual • Business Attribute Profile • Control Objectives Library • SABSA Domains • Business Attributes • Risk Model • Policy Architecture • Control Objectives • Sub-Domains • Logical • Security Services • Security Mechanisms • Security Components PSD/2 Other Projects External Data Sources Reusable AssetsBusiness Projects Effective Deployment is to provision this on a Database Views (diagrams, tables etc.) Views (diagrams, tables etc.) Project Deliverables Create Views Update Assets Sync Assets
  • 15. S | E | A | M Advisory and Consulting In the tool … Business Projects Reusable Assets Example Import from external sources
  • 16. S | E | A | M Advisory and Consulting Contextual Architecture Mainly focusing on Risk Model [Threats]
  • 17. S | E | A | M Advisory and Consulting SABSA – Contextual Layer  Business Risk Model Risk Model Opportunities Threats Model Threats Inventory Threat Scenario Opportunities Inventory Opportunities Scenario • Threat Agents • Relevant Threats • …
  • 18. S | E | A | M Advisory and Consulting In the tool … Hierarchy as per previous slide Modelling is NOT just diagrams, diagram elements and relationships – it is communication tool expected to communicate design intent with clarity. If description is needed, put it in the diagram notes. It gets published when documents are published from the model. Master Threat information resides in Reusable Assets. Frequent updates to threat information possible. Reference: Threat Intelligence Sharing using STIX and TAXII
  • 19. S | E | A | M Advisory and Consulting Contextual Architecture Other Views Business Model [Assets] Business Capabilities [Process Inventory] Organisation Structure [People] Business Geography [Location] Business Time Dependencies [Time]
  • 20. S | E | A | M Advisory and Consulting Conceptual Architecture Business Attributes Profile, Control Objectives and Domains
  • 21. S | E | A | M Advisory and ConsultingBusiness Attribute Profile Refer to meta-model slides between slides 5 and 8 It is a good idea to host ‘Business Attribute Profile Template’ in reusable assets. All domains could use it as a starting point. Impacted Business Attributes SABSA Properties of Business Attributes NOTE: The profile provided with the package need to be imported into the tool for these to appear.
  • 22. S | E | A | M Advisory and ConsultingTraceability from Contextual elements to Business Attributes If the relationships exist, they appear when the elements are drag-and- dropped into a diagram. Trace relationship can produce traceability in a tabular form.
  • 23. S | E | A | M Advisory and Consulting Control Objectives Control Objective Library – ISF 2016 SoGP Control Objectives Principle and Objective as described by ISF SoGP can also be imported SoGP = Standard of Good Practice Control Objectives from any standards could be imported
  • 24. S | E | A | M Advisory and ConsultingLinking Control Objectives to Business Attributes Tags are the best way to specify additional, context-specific information without impacting model integrity. However, tooling vendors seems to support tags in multiple ways. Trace relationships could automatically provide relationship matrix [tool dependent].
  • 25. S | E | A | M Advisory and ConsultingSABSA Domain – As container So far, reusable assets just held catalogues. SABSA domains provides the first view of Reusable Reference Architecture contextualised to a specific organisation.
  • 26. S | E | A | M Advisory and Consulting Logical Architecture Trust Model, Security Services and Usage of Security Services
  • 27. S | E | A | M Advisory and Consulting Trust Model Functional Interactions Trust expressed through usage of Business Attributes and Trust Relationships Work in progress in this area to develop a better SABSA notation
  • 28. S | E | A | M Advisory and Consulting Security Services Used in same spirit as SOA Services (one of the use cases)
  • 29. S | E | A | M Advisory and Consulting Security Services Used in same spirit as SOA Services (one of the use cases)
  • 30. S | E | A | M Advisory and Consulting Traceability From business attributes to security services