A practical example of using the SABSA extended Security-in-depth layer strategy. A little bit of insight into why and how I extended the original and how to use it to create Information Security Standards that have sound architecture behind them.
Changing the Security Landscape: An overview of the powerful SABSA Business Attributes Profiling technique and it's applications and benefits including two-way traceability, risk & opportunity management, strategic planing and executive reporting.
Changing the Security Landscape: An overview of the powerful SABSA Business Attributes Profiling technique and it's applications and benefits including two-way traceability, risk & opportunity management, strategic planing and executive reporting.
The intent of the paper is to propose a simple yet comprehensive technique to model enterprise security architecture and design aligned to SABSA that enables –
Standardisation of SABSA Enterprise Security Architecture framework by formalizing common language used in the form of ESA modelling notation
Reusability of model artefacts (not documents) to enable enterprise and department level collaboration and knowledge management
Generic or organisation specific Library of assets for various ESA artefacts such as – Business attribute profile(s), security services, mechanisms and components and associated views
Tool-assisted development using a separate toolbox for ESA that augments Enterprise Architecture (ToGAF) modelling using Archimate.
Enterprise Architecture
Enterprise Architectural Methodologies
A Brief History of Enterprise Architecture
Zachman Framework
Business Attributes
Features & Advantages
SABSA Lifecycle
SABSA Development Process
SMP Maturity Levels
Enterprise Security Architecture was initially targeted to address two problems
1- System complexity
2- Inadequate business alignment
Resulting into More Cost, Less Value
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
Cyber Security is one of the major challenges facing organisations within all industries. This presentation will examine the integration of an Enterprise Architecture approach with an Enterprise Security Architecture approach (TOGAF and SABSA) and propose a generic framework.
Download this presentation at http://opengroup.co.za/presentations
Information Security Architecture: Building Security Into Your OrganziationSeccuris Inc.
Controls and solutions can mitigate risk, but can also deeply undermine business productivity and the benefits that new technologies may bring. Harnessing the SABSA Information Security framework will allow your organization to build robust enterprise security architecture, directly supporting and enabling your organization's core objectives.
This presentation will highlight the key concerns you should be aware of within your organization and current security program, as well as provide specific recommendations to successfully move your security and compliance goals ahead. Learn more about the techniques and tools readily available in the industry and how you can use these tools to create immediate wins and security improvements in your organization.
HD version: http://1drv.ms/1eR5OQf
This is my publication on how the integration of the TOGAF Enterprise Architecture framework, the SABSA Enterprise Security Architecture framework, and Information Governance discipline add up to a robust and successful Information Security Management Program.
Jonathan Pollet and Mark Heard of Red Tiger Security at S4x15 OTDay.
The NIST Cybersecurity Framework (CSF) has been out for a year now, and some owner/operators have begun to use it to help create an ICS cyber security program. The Red Tiger Security team discusses what the CSF is and there experience in using it with real world clients.
PaloAlto Networks is world’s Cyber Security leader. Their technologies give 65,000 enterprise customers the power to
protect billions of people worldwide.
Cortex, Demisto & Prisma are the few flagship products to prevent attacks with industry-defining enterprise security platforms. Tightly integrated innovations, cloud delivered and easy to deploy and operate.
Summarize the design and build approach for SOC (Security Operation Center) for both end user company and service providers. Defines the approach flow for SOC building and various components and phases involved. Defines design thumb rules and parameters for SOC Design.
Building an effective Information Security RoadmapElliott Franklin
As company information security functions continue to grow each year with increasing attacks and regulations, how are you handling the
pressure? Are you constantly battling to run the business projects and reacting to customer requests? Have you blocked off a few hours each week
on your calendar to close your email, turn off your phone and try to build, assess and maintain an effective vision for your security team? This
presentation will discuss a cascading approach to creating such a roadmap that is easily understood by executives and has helped gain quick buy
in for multiple enterprise wide security projects.
The intent of the paper is to propose a simple yet comprehensive technique to model enterprise security architecture and design aligned to SABSA that enables –
Standardisation of SABSA Enterprise Security Architecture framework by formalizing common language used in the form of ESA modelling notation
Reusability of model artefacts (not documents) to enable enterprise and department level collaboration and knowledge management
Generic or organisation specific Library of assets for various ESA artefacts such as – Business attribute profile(s), security services, mechanisms and components and associated views
Tool-assisted development using a separate toolbox for ESA that augments Enterprise Architecture (ToGAF) modelling using Archimate.
Enterprise Architecture
Enterprise Architectural Methodologies
A Brief History of Enterprise Architecture
Zachman Framework
Business Attributes
Features & Advantages
SABSA Lifecycle
SABSA Development Process
SMP Maturity Levels
Enterprise Security Architecture was initially targeted to address two problems
1- System complexity
2- Inadequate business alignment
Resulting into More Cost, Less Value
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
Cyber Security is one of the major challenges facing organisations within all industries. This presentation will examine the integration of an Enterprise Architecture approach with an Enterprise Security Architecture approach (TOGAF and SABSA) and propose a generic framework.
Download this presentation at http://opengroup.co.za/presentations
Information Security Architecture: Building Security Into Your OrganziationSeccuris Inc.
Controls and solutions can mitigate risk, but can also deeply undermine business productivity and the benefits that new technologies may bring. Harnessing the SABSA Information Security framework will allow your organization to build robust enterprise security architecture, directly supporting and enabling your organization's core objectives.
This presentation will highlight the key concerns you should be aware of within your organization and current security program, as well as provide specific recommendations to successfully move your security and compliance goals ahead. Learn more about the techniques and tools readily available in the industry and how you can use these tools to create immediate wins and security improvements in your organization.
HD version: http://1drv.ms/1eR5OQf
This is my publication on how the integration of the TOGAF Enterprise Architecture framework, the SABSA Enterprise Security Architecture framework, and Information Governance discipline add up to a robust and successful Information Security Management Program.
Jonathan Pollet and Mark Heard of Red Tiger Security at S4x15 OTDay.
The NIST Cybersecurity Framework (CSF) has been out for a year now, and some owner/operators have begun to use it to help create an ICS cyber security program. The Red Tiger Security team discusses what the CSF is and there experience in using it with real world clients.
PaloAlto Networks is world’s Cyber Security leader. Their technologies give 65,000 enterprise customers the power to
protect billions of people worldwide.
Cortex, Demisto & Prisma are the few flagship products to prevent attacks with industry-defining enterprise security platforms. Tightly integrated innovations, cloud delivered and easy to deploy and operate.
Summarize the design and build approach for SOC (Security Operation Center) for both end user company and service providers. Defines the approach flow for SOC building and various components and phases involved. Defines design thumb rules and parameters for SOC Design.
Building an effective Information Security RoadmapElliott Franklin
As company information security functions continue to grow each year with increasing attacks and regulations, how are you handling the
pressure? Are you constantly battling to run the business projects and reacting to customer requests? Have you blocked off a few hours each week
on your calendar to close your email, turn off your phone and try to build, assess and maintain an effective vision for your security team? This
presentation will discuss a cascading approach to creating such a roadmap that is easily understood by executives and has helped gain quick buy
in for multiple enterprise wide security projects.
As public and private cloud adoption skyrockets, the number of attacks against cloud infrastructure is also increasing dramatically. Now more than ever, it is crucial to secure your cloud assets and data against advanced threats.
We’ll dig into what it means to be successful in the cloud and what successful organizations do more of (and less of) than their less successful peers. We’ll look across technologies adopted, organizational and operational practices, and vendors embraced.
Recorded webinar: https://youtu.be/Og1-xcc7JNs
How to Overcome Network Access Control Limitations for Better Network SecurityCryptzone
This eBook discusses network access control (NAC) limitations offering details on why a Software-Defined Perimeter delivers better network security for today's enterprise.
Preventing The Cloud Data Breaches:
The Cloud as The New Normal,
The Concept of Cloud Computing,
Why is The cloud The New Normal?
Shared Responsibilities in the Cloud,
The Concept of The security of The Cloud and Security in The Cloud,
Your Cloud Data as Your Most Critical Asset,
Service Level Agreement/Contract Terms,
Securing your Cloud Data(Data LifeCycle, Data States, Identity & access Management, Data Obfuscation, Overall Cloud Security),
Combat Cloud Data Threats(STRIDE vs DREAD),
Putting it ALL Together
Protecting your mission-critical data and applications in the cloud can best be accomplished through a joint effort between your organization and your cloud services provider (CSP).
Zero Trust Network Access cannot be divined to be just a single network architecture, but is
rather a set of guiding principles in terms of both network design and network operation,
that dramatically revamps the security infrastructure of an organisation, while at the same
time, increasing visibility and the scope for analytics across the network.
In practice, we often see SAP security projects that only offer a partial solution. Only rarely do such projects involve an end-to-end examination of all layers – from operating system to databases and applications, as well as concepts and policies.
At the same time, an all-encompassing approach to security is essential for projects involving the implementation of or migration to SAP S/4HANA, because the database, user interface, gateway, applications, and authorizations have all grown closer together. As a result, access to important data has become both more complex and more difficult to monitor – especially due to media discontinuity and access options at different layers. This means your framework authorization concept has to combine all these topics prior to implementation and define an end-to-end security strategy.
Ideally, all the security expertise needed for a comprehensive solution like this will come from a single source. This will guarantee perfect interplay between design and management, as well as monitoring, administration, and auditing. And you will also cover all the security areas, in the sense of a comprehensive SIEM system.
In this webinar, we will show you why SAST SOLUTIONS, with our highly specialized SAP experts in combination with our SAST SUITE solution, have just what you are looking for.
Topics of focus:
• The challenges of successful SAP S/4HANA security projects
• How to make sure your SAP S/4HANA implementation or migration is a success
• Benefits of support by SAST SUITE tools
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Security in Clouds: Cloud security challenges – Software as a
Service Security, Common Standards: The Open Cloud Consortium – The Distributed management Task Force – Standards for application Developers – Standards for Messaging – Standards for Security, End user access to cloud computing, Mobile Internet devices and the cloud. Hadoop – MapReduce – Virtual Box — Google App Engine – Programming Environment for Google App Engine.
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
Enhance data security with our Data Resilience Cloud. No software/hardware; solve security challenges. Scale resources dynamically. Achieve resilience, efficiency, compliance. Partner with Cuneiform for seamless cloud data protection.
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
Enhance data security with our Data Resilience Cloud. No software/hardware; solve security challenges. Scale resources dynamically. Achieve resilience, efficiency, compliance. Partner with Cuneiform for seamless cloud data protection.
put the
finishing touches on this book, Twitter is busy recovering
from the latest very public and newsworthy cybersecurity
incident widely reported in the media. For every one of
these highly publicized breaches there are hundreds of
other damaging cyberattacks experienced by businesses
and government entities. To help organizations protect
themselves against and respond to information security
incidents, many of them turn to the chief information
security officer (CISO) for leadership. The CISO is
becoming the guardian of the modern business, charged
with protecting the organization against security threats
in the digital world.
Similar to A Practical Example to Using SABSA Extended Security-in-Depth Strategy (20)
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
What is the TDS Return Filing Due Date for FY 2024-25.pdfseoforlegalpillers
It is crucial for the taxpayers to understand about the TDS Return Filing Due Date, so that they can fulfill your TDS obligations efficiently. Taxpayers can avoid penalties by sticking to the deadlines and by accurate filing of TDS. Timely filing of TDS will make sure about the availability of tax credits. You can also seek the professional guidance of experts like Legal Pillers for timely filing of the TDS Return.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
Buy Verified PayPal Account | Buy Google 5 Star Reviewsusawebmarket
Buy Verified PayPal Account
Looking to buy verified PayPal accounts? Discover 7 expert tips for safely purchasing a verified PayPal account in 2024. Ensure security and reliability for your transactions.
PayPal Services Features-
🟢 Email Access
🟢 Bank Added
🟢 Card Verified
🟢 Full SSN Provided
🟢 Phone Number Access
🟢 Driving License Copy
🟢 Fasted Delivery
Client Satisfaction is Our First priority. Our services is very appropriate to buy. We assume that the first-rate way to purchase our offerings is to order on the website. If you have any worry in our cooperation usually You can order us on Skype or Telegram.
24/7 Hours Reply/Please Contact
usawebmarketEmail: support@usawebmarket.com
Skype: usawebmarket
Telegram: @usawebmarket
WhatsApp: +1(218) 203-5951
USA WEB MARKET is the Best Verified PayPal, Payoneer, Cash App, Skrill, Neteller, Stripe Account and SEO, SMM Service provider.100%Satisfection granted.100% replacement Granted.
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxmy Pandit
Explore the world of the Taurus zodiac sign. Learn about their stability, determination, and appreciation for beauty. Discover how Taureans' grounded nature and hardworking mindset define their unique personality.
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
Grote partijen zijn al een tijdje onderweg met retail media. Ondertussen worden in dit domein ook de kansen zichtbaar voor andere spelers in de markt. Maar met die kansen ontstaan ook vragen: Zelf retail media worden of erop adverteren? In welke fase van de funnel past het en hoe integreer je het in een mediaplan? Wat is nu precies het verschil met marketplaces en Programmatic ads? In dit half uur beslechten we de dilemma's en krijg je antwoorden op wanneer het voor jou tijd is om de volgende stap te zetten.
Improving profitability for small businessBen Wann
In this comprehensive presentation, we will explore strategies and practical tips for enhancing profitability in small businesses. Tailored to meet the unique challenges faced by small enterprises, this session covers various aspects that directly impact the bottom line. Attendees will learn how to optimize operational efficiency, manage expenses, and increase revenue through innovative marketing and customer engagement techniques.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...Kumar Satyam
According to TechSci Research report, “India Orthopedic Devices Market -Industry Size, Share, Trends, Competition Forecast & Opportunities, 2030”, the India Orthopedic Devices Market stood at USD 1,280.54 Million in 2024 and is anticipated to grow with a CAGR of 7.84% in the forecast period, 2026-2030F. The India Orthopedic Devices Market is being driven by several factors. The most prominent ones include an increase in the elderly population, who are more prone to orthopedic conditions such as osteoporosis and arthritis. Moreover, the rise in sports injuries and road accidents are also contributing to the demand for orthopedic devices. Advances in technology and the introduction of innovative implants and prosthetics have further propelled the market growth. Additionally, government initiatives aimed at improving healthcare infrastructure and the increasing prevalence of lifestyle diseases have led to an upward trend in orthopedic surgeries, thereby fueling the market demand for these devices.
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
5 Things You Need To Know Before Hiring a Videographer
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
1. A Practical Example to Using SABSA
Extended Security-in-Depth Strategy
Allen Baranov
2. Who Am I?
Allen Baranov, CISSP
Information Security Professional
SABSA Foundation Certified
Specialist In Security Management, Security Architecture and
Risk and Compliance
Looking for new permanent position!
See LinkedIn for more details or email me for more information!
au.linkedin.com/in/allenbaranov/
3. This is my proposal for an extended Security-in-Depth Strategy. It is based on the
one in the official SABSA documentation but extended to be more practical as
you’ll see later in this presentation.
Assurance • Deter
• InviteNegotiate
• Prevent
• AllowEnforcement
• Contain (Deny)
• (Continue to) Allow
Post Breach
Enforcement
• Detect and Notify
• Detect and Process (Service)Activity Monitoring
• Evidence & Track
• Baseline and service improvementTraffic Monitoring
• Recover and Restore
• Monitor and Optimise (Hierarchical Storage Management)
Data Availability
Maint.
Extended SABSA Security-in-Depth Strategy
4. Deter
Prevent
Contain
Detect and Notify
Evidence & Track
Recover + Restore
Assure
Original SABSA Security-in-Depth Strategy
This is the original SABSA S-i-D Strategy diagram. You will see that it has “negative”
actions which (IMHO) doesn’t fit with the SABSA risk/opportunity philosophy.
5. … so I extended it. For each negative action, there is a positive one and I have
grouped them into 6 groups. I moved Assurance to its own super group with each
level feeding back to it. This is still a WIP and I am keen for feedback.
Assurance • Deter
• InviteNegotiate
• Prevent
• AllowEnforcement
• Contain (Deny)
• (Continue to) Allow
Post Breach
Enforcement
• Detect and Notify
• Detect and Process (Service)Activity Monitoring
• Evidence & Track
• Baseline and service improvementTraffic Monitoring
• Recover and Restore
• Monitor and Optimise (Hierarchical Storage Management)
Data Availability
Maint.
Extended SABSA Security-in-Depth Strategy
6. Deconstructing the purpose of a Firewall.
• Operates on the network layer.
• It usually defines the border between two networks of differing
levels of risk.
• It investigates traffic and makes decisions on how to pass the traffic
based on predefined rules (known as rulebase or policy)
• It can be used for tracking connectivity.
• Firewalls may also do deeper inspection into network traffic and
Firewalls may be physical hardware, software, dedicated boxes, a
service or a virtual machine.
Practical Example - Firewalls
I extended it so as to come up with a practical way to use SABSA for writing a
Firewall Standard. The first thing to do is to work out exactly what a Firewall is
aiming to achieve. Then to fit it into the 6 layers of the model. See next slide.
7. •Deter – create logical border between networks
•Invite authorised traffic to be used for business purposes
Negotiate Network
Usage
•Prevent – prevent unauthorised traffic from flowing across the network boundary
•Allow – allow authorised (business enhancing) traffic across the network boundary.
Enforcement of
predefined rules
•Contain (Deny) – Temporarily stop a compromised network leaking onto a “clean” network.
•(Continue to) Allow “clean” networks to communicate until a breach is detected.
Post Breach Network
Management
•Detect and Notify – monitor all traffic and notify of suspicious traffic.
•Detect and Process – allow network traffic to pass and baseline “normal”
Network Activity
Monitoring
•Evidence & Track – watch for anomalies on traffic flow and suspicious connections to build a profile of activities.
•Baseline and service improvement – watch for opportunities to improve connectivity and gain understanding of
network usage across the org.
Network Traffic
Monitoring
•Recover and Restore – have redundant devices and network connections with automatic service continuation.
•Monitor and Optimise – Look for opportunities for reducing speed in some connections and increasing speed for
others.
Network Availability
Maint.
Practical Example - Firewalls
8. I then took each layer and this became a section in the Standard. Note that
especially the “Negotiate” section should be written as a contract with both what
will be delivered and what is expected.
9. This way the Standards can be more comprehensive.
They are also not so negative and they show the balance of what is needed
for compliance and security against what is offered.
The firewall standard, for example, shows that without a firewall all the
benefits of the Internet would not be available.
Also, while we are monitoring for bad traffic, we could also be monitoring for
performance.
There is one more major advantage that turns the whole SABSA philosophy
on its head but I will save that one for next time… ;)
For more, visit my blog – http://securethink.blogspot.com.au
10. …other bits and pieces
What is SABSA?
SABSA is a proven framework and methodology for Enterprise Security Architecture and Service Management
used successfully by numerous organisations around the world. Now used globally to meet a wide variety of
Enterprise needs including Risk Management, Information Assurance, Governance, and Continuity
Management, SABSA has evolved since 1995 to be the 'approach of choice' for commercial organisations and
Government alike.
SABSA ensures that the needs of your enterprise are met completely and that security services are designed,
delivered and supported as an integral part of your business and IT management infrastructure.
Although copyright protected, SABSA is an open-use methodology, not a commercial product.
Images
All images are used with permission. Some are from the site stock.xchng (http://www.sxc.hu/)