SlideShare a Scribd company logo
CONCEPTUAL SECURITY
ARCHITECTURE
SECURITY ARCHITECTURE ?
• Security architecture is a unified security design that addresses the
necessities and potential risks involved in a certain scenario or
environment. It also specifies when and where to apply security
controls.
EXAMPLE:-
• Traditionally, security architecture consists of some preventive,
detective and corrective controls that are implemented to protect
the enterprise infrastructure and applications.
ENTERPRISE FRAMEWORKS
 SABSA
 Sherwood Applied Business Security Architecture
 TOGAF
 The Open Group Architecture Framework
SABSA OVERVIEW
• Five layer framework that answers the why, how, who, where and
when for security architecture.
• Five layers are Contextual Architecture, Conceptual Architecture,
Logical Architecture, Physical Architecture and Component
Architecture.
• A sixth layer is added for Service Management Architecture and is
synonymous with Operational Security Architecture.
SABSA (SHERWOOD APPLIED BUSINESS SECURITY
ARCHITECTURE)
(SABSA) FRAMEWORK –FULLY QUALIFIED
CONCEPTUAL SECURITY ARCHITECTURE
• This layer provides the overall concept by which the business requirements
of the enterprise may be met. The following information needs to be obtained:
• what needs to be protected;
• why protection is important and
• how it will be achieved;
• who will be involved in security management; physical and logical security
domains; time management framework as related to security.
BUSINESS ATTRIBUTE PROFILE
• This section explains in detail how this Business Attributes Profile is used as the
key tool for conceptualizing the business assets that need protection in an
information security architecture.
• The Business Attribute Profile is the complete set of Business Attributes that
you believe represents your business, mapped to business drivers and business
risks, and with a measurement approach for producing metrics and specific
performance targets defined for each one.
• This profile is a powerful tool that allows any unique business to be translated
into common terminology and normalized. The profile selects only those Business
Attributes that apply to this specific business (creating new attributes if there are
found to be gaps). The taxonomy provides a checklist of possible attributes. The
Business Analysts can decide whether or not a given attribute should be included
in this specific profile. The senior executives will usually need to sign off on the
overall Business Attributes Profile.
• The Business Attributes Profile is an important conceptualization of the real business
and forms a core part of the conceptual security architecture.
• It also allows the selection of metrics that are used to set performance targets as an
integral part of the Business Attributes Profile that can later be measured to answer
the question: ‘Did we hit the target?’ This too is at the choice of the business analysts,
using either the suggested measurement approaches in the detailed definitions of the
attributes, or creating new measurement approaches if this seems more appropriate.
Once again, the performance targets usually need to be signed off at senior
executive level.
CONTROL OBJECTIVES
• This section explains in detail how the control objectives are used as the key tool
for conceptualizing the mitigation strategy to address the identified business
risks.
• A control objective is a statement of a desired result or purpose to be achieved
by implementing controls within a particular business activity. Controls are
implemented through policies, organizational structures, processes, practices and
procedures, and through technical systems.
• A control objective can be stated in response to specific business requirements
for control, or it can be a generic ‘good practice’ statement that should be
applied to all businesses.
• The control objectives form an interface between the contextual and conceptual
layer.
• There are several sources of generic ‘good practice’ control objectives
There are several sources of generic ‘good practice’ control objectives
such as:
 ISO/IEC 17799: ‘A Code of Practice for Information Security Management’2;
 ISO/IEC 21827: ‘Systems Security Engineering Capability Maturity Model’3;
 CobiTTM: ‘Control Objectives for Information and related Technology’4;
 ISF’s5 ‘Standard for Good Practice’6;
SECURITY STRATEGIES AND ARCHITECTURAL
LAYERING
• There are many security strategies that you can adopt and many ways in which
you can layer your security architecture. This section examines some of these
possibilities in some detail, at a conceptual level.
• Security architecture is not the same as software architecture.
MULTI-LAYERED SECURITY
Increased effectiveness is achieved by multiple layers of security of different types
• The primary reason for this multi-layered approach is to ensure that there is no
single point of failure in the security measures. If one measure fails to stop a
security incident, then there are others that do the job in a different way. The
multiple layers provide a reasonable level of assurance that there are multiple
ways of preventing security breaches. This is a fundamental principle that is
strongly recommended that you adopt in your security architecture.
SECURITY STRATEGIES INCLUDES:-
• Authentication, Authorization and Audit Strategy
• Security Service Management Strategy
• System Assurance Strategy
SECURITY ENTITY MODEL AND TRUST FRAMEWORK
 Security Entities
 A security entity is something or someone that can take actions in a business environment.
These actions need to be controlled through authorization processes and through technical
and procedural controls that enforce the authorizations. Security entities are of several
types:
 Individual personal entities (people);
 Corporate entities (organizations or organizational units, whether legally recognized as
entities or not);
 Application or system entities – automated processes that act on behalf of personal or
corporate entities.
• Security Entity Naming
 Each security entity must be identified with a globally unique name to ensure that
there will never be confusion about which entity is being referenced.
• Security Entity Relationships
 Security entity relationships are characterized by the information flows that represent
the relationship.
 There are three major types of entity relationship that you must
consider:
a. Unilateral relationships – in which one entity broadcasts or publishes
information and other entities may receive it at their choice;
b. Bilateral relationships – in which two entities make a specific contract
(either formal or informal) to transact business and exchange information;
c. Multilateral relationships – in which a number of entities participate in a
group relationship under an agreed set of rules.
• Understanding and Modelling Trust
• Trust in the merchant-customer relationship
SECURITY DOMAIN MODEL
• Security Domains
 A security domain is a set of security elements subject to a common security
policy defined and enforced by a single security policy authority. The
activities of a security domain involve one or more elements from that
security domain, and possibly elements of other security domains.
 A security element may be a security entity or a security object.
• Trust in Domains
 Trusted entities in a domain
 Conditional and unconditional trust Conditional and unconditional trust
 Trust is not necessarily two way or transitive
• Secure Interaction Between Domains
• To be able to exchange information between domains the domain policy
authorities must agree a set of security policy rules governing this interaction –
known as secure interaction rules
SECURITY LIFETIMES AND DEADLINES
• This section explains in detail the main lifetime and deadline concepts that you need
to consider.
• Registration Lifetimes
 Each registered entity is registered for a fixed period of time, after which the registration
expires and must be renewed.
• Certification Lifetimes
 A registered entity can be issued with a set of digital certificates with which to
authenticate messages and exchange encryption keys. These digital certificates also have
fixed lifetime, after which the certificate expires and cannot be used.
Conceptual security architecture
Conceptual security architecture

More Related Content

What's hot

SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSAcourses
 
The Future of Security Architecture Certification
The Future of Security Architecture CertificationThe Future of Security Architecture Certification
The Future of Security Architecture Certificationdanb02
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitectureKris Kimmerle
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitecturePriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecturenarenvivek
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architectureVladimir Jirasek
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationSeccuris Inc.
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 

What's hot (20)

SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0
 
Security review using SABSA
Security review using SABSASecurity review using SABSA
Security review using SABSA
 
SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summary
 
SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0
 
The Future of Security Architecture Certification
The Future of Security Architecture CertificationThe Future of Security Architecture Certification
The Future of Security Architecture Certification
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecture
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
SABSA overview
SABSA overviewSABSA overview
SABSA overview
 
SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part IV)_ver1-0SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part IV)_ver1-0
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 

Similar to Conceptual security architecture

Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptxHardikKundra
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit ProcessRam Srivastava
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxMark Simos
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptxdotco
 
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15FitCEO, Inc. (FCI)
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.FitCEO, Inc. (FCI)
 
Agiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key StepsAgiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key Stepsagiliancecommunity
 
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1sharing notes123
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, aMaximaSheffield592
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsPECB
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notesedwinlorenzana
 
Role of the virtual ciso
Role of the virtual cisoRole of the virtual ciso
Role of the virtual cisoMichael Ball
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala LumpurAlan Yau Ti Dun
 

Similar to Conceptual security architecture (20)

Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit Process
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptx
 
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
 
Agiliance Wp Key Steps
Agiliance Wp Key StepsAgiliance Wp Key Steps
Agiliance Wp Key Steps
 
Agiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key StepsAgiliance Whitepaper - Six Key Steps
Agiliance Whitepaper - Six Key Steps
 
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
 
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, a
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notes
 
Unit 4 standards.ppt
Unit 4 standards.pptUnit 4 standards.ppt
Unit 4 standards.ppt
 
Role of the virtual ciso
Role of the virtual cisoRole of the virtual ciso
Role of the virtual ciso
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
 

Recently uploaded

How To Build a Successful SaaS Design.pdf
How To Build a Successful SaaS Design.pdfHow To Build a Successful SaaS Design.pdf
How To Build a Successful SaaS Design.pdfayushiqss
 
Benefits of Employee Monitoring Software
Benefits of  Employee Monitoring SoftwareBenefits of  Employee Monitoring Software
Benefits of Employee Monitoring SoftwareMera Monitor
 
iGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockiGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockSkilrock Technologies
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
INGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignINGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignNeo4j
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowPeter Caitens
 
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with StrimziStrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzisteffenkarlsson2
 
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
KLARNA -  Language Models and Knowledge Graphs: A Systems ApproachKLARNA -  Language Models and Knowledge Graphs: A Systems Approach
KLARNA - Language Models and Knowledge Graphs: A Systems ApproachNeo4j
 
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Gáspár Nagy
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...rajkumar669520
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Krakówbim.edu.pl
 
A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationHelp Desk Migration
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1KnowledgeSeed
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareinfo611746
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationHelp Desk Migration
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisNeo4j
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
 

Recently uploaded (20)

How To Build a Successful SaaS Design.pdf
How To Build a Successful SaaS Design.pdfHow To Build a Successful SaaS Design.pdf
How To Build a Successful SaaS Design.pdf
 
Benefits of Employee Monitoring Software
Benefits of  Employee Monitoring SoftwareBenefits of  Employee Monitoring Software
Benefits of Employee Monitoring Software
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
iGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockiGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by Skilrock
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
INGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignINGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by Design
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with StrimziStrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
 
Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024
 
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
KLARNA -  Language Models and Knowledge Graphs: A Systems ApproachKLARNA -  Language Models and Knowledge Graphs: A Systems Approach
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
 
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data Migration
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting software
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data Migration
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysis
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 

Conceptual security architecture

  • 2. SECURITY ARCHITECTURE ? • Security architecture is a unified security design that addresses the necessities and potential risks involved in a certain scenario or environment. It also specifies when and where to apply security controls.
  • 3. EXAMPLE:- • Traditionally, security architecture consists of some preventive, detective and corrective controls that are implemented to protect the enterprise infrastructure and applications.
  • 4. ENTERPRISE FRAMEWORKS  SABSA  Sherwood Applied Business Security Architecture  TOGAF  The Open Group Architecture Framework
  • 5. SABSA OVERVIEW • Five layer framework that answers the why, how, who, where and when for security architecture. • Five layers are Contextual Architecture, Conceptual Architecture, Logical Architecture, Physical Architecture and Component Architecture. • A sixth layer is added for Service Management Architecture and is synonymous with Operational Security Architecture.
  • 6. SABSA (SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE)
  • 8. CONCEPTUAL SECURITY ARCHITECTURE • This layer provides the overall concept by which the business requirements of the enterprise may be met. The following information needs to be obtained: • what needs to be protected; • why protection is important and • how it will be achieved; • who will be involved in security management; physical and logical security domains; time management framework as related to security.
  • 9. BUSINESS ATTRIBUTE PROFILE • This section explains in detail how this Business Attributes Profile is used as the key tool for conceptualizing the business assets that need protection in an information security architecture. • The Business Attribute Profile is the complete set of Business Attributes that you believe represents your business, mapped to business drivers and business risks, and with a measurement approach for producing metrics and specific performance targets defined for each one.
  • 10. • This profile is a powerful tool that allows any unique business to be translated into common terminology and normalized. The profile selects only those Business Attributes that apply to this specific business (creating new attributes if there are found to be gaps). The taxonomy provides a checklist of possible attributes. The Business Analysts can decide whether or not a given attribute should be included in this specific profile. The senior executives will usually need to sign off on the overall Business Attributes Profile.
  • 11. • The Business Attributes Profile is an important conceptualization of the real business and forms a core part of the conceptual security architecture. • It also allows the selection of metrics that are used to set performance targets as an integral part of the Business Attributes Profile that can later be measured to answer the question: ‘Did we hit the target?’ This too is at the choice of the business analysts, using either the suggested measurement approaches in the detailed definitions of the attributes, or creating new measurement approaches if this seems more appropriate. Once again, the performance targets usually need to be signed off at senior executive level.
  • 12. CONTROL OBJECTIVES • This section explains in detail how the control objectives are used as the key tool for conceptualizing the mitigation strategy to address the identified business risks. • A control objective is a statement of a desired result or purpose to be achieved by implementing controls within a particular business activity. Controls are implemented through policies, organizational structures, processes, practices and procedures, and through technical systems.
  • 13. • A control objective can be stated in response to specific business requirements for control, or it can be a generic ‘good practice’ statement that should be applied to all businesses. • The control objectives form an interface between the contextual and conceptual layer.
  • 14. • There are several sources of generic ‘good practice’ control objectives There are several sources of generic ‘good practice’ control objectives such as:  ISO/IEC 17799: ‘A Code of Practice for Information Security Management’2;  ISO/IEC 21827: ‘Systems Security Engineering Capability Maturity Model’3;  CobiTTM: ‘Control Objectives for Information and related Technology’4;  ISF’s5 ‘Standard for Good Practice’6;
  • 15. SECURITY STRATEGIES AND ARCHITECTURAL LAYERING • There are many security strategies that you can adopt and many ways in which you can layer your security architecture. This section examines some of these possibilities in some detail, at a conceptual level. • Security architecture is not the same as software architecture.
  • 16. MULTI-LAYERED SECURITY Increased effectiveness is achieved by multiple layers of security of different types
  • 17. • The primary reason for this multi-layered approach is to ensure that there is no single point of failure in the security measures. If one measure fails to stop a security incident, then there are others that do the job in a different way. The multiple layers provide a reasonable level of assurance that there are multiple ways of preventing security breaches. This is a fundamental principle that is strongly recommended that you adopt in your security architecture.
  • 18. SECURITY STRATEGIES INCLUDES:- • Authentication, Authorization and Audit Strategy • Security Service Management Strategy • System Assurance Strategy
  • 19. SECURITY ENTITY MODEL AND TRUST FRAMEWORK  Security Entities  A security entity is something or someone that can take actions in a business environment. These actions need to be controlled through authorization processes and through technical and procedural controls that enforce the authorizations. Security entities are of several types:  Individual personal entities (people);  Corporate entities (organizations or organizational units, whether legally recognized as entities or not);  Application or system entities – automated processes that act on behalf of personal or corporate entities.
  • 20. • Security Entity Naming  Each security entity must be identified with a globally unique name to ensure that there will never be confusion about which entity is being referenced. • Security Entity Relationships  Security entity relationships are characterized by the information flows that represent the relationship.
  • 21.  There are three major types of entity relationship that you must consider: a. Unilateral relationships – in which one entity broadcasts or publishes information and other entities may receive it at their choice; b. Bilateral relationships – in which two entities make a specific contract (either formal or informal) to transact business and exchange information; c. Multilateral relationships – in which a number of entities participate in a group relationship under an agreed set of rules.
  • 22. • Understanding and Modelling Trust • Trust in the merchant-customer relationship
  • 23. SECURITY DOMAIN MODEL • Security Domains  A security domain is a set of security elements subject to a common security policy defined and enforced by a single security policy authority. The activities of a security domain involve one or more elements from that security domain, and possibly elements of other security domains.  A security element may be a security entity or a security object.
  • 24. • Trust in Domains  Trusted entities in a domain  Conditional and unconditional trust Conditional and unconditional trust  Trust is not necessarily two way or transitive • Secure Interaction Between Domains • To be able to exchange information between domains the domain policy authorities must agree a set of security policy rules governing this interaction – known as secure interaction rules
  • 25. SECURITY LIFETIMES AND DEADLINES • This section explains in detail the main lifetime and deadline concepts that you need to consider. • Registration Lifetimes  Each registered entity is registered for a fixed period of time, after which the registration expires and must be renewed. • Certification Lifetimes  A registered entity can be issued with a set of digital certificates with which to authenticate messages and exchange encryption keys. These digital certificates also have fixed lifetime, after which the certificate expires and cannot be used.