ISSA, Colorado Springs Chapter: Enterprise Security Architecture
ISSA, Colorado Springs Chapter: Enterprise Security Architecture
14 years ago…
In a 2003 memo, Sen. Joseph Lieberman, D-Conn., said, "federal
agencies should be deriving better results from the $60 billion spent
annually on information technology. Much of that money is wasted on IT
systems that are redundant or obsolete." Moreover, Lieberman wrote,
"The lion's share of the $60 billion spent on IT is spent on service
contracts, and there is ample evidence to suggest that oversight of
these contracts has been deficient."
Legislation
January 3, 1995 – January 3, 1997 January 24, 1997 – January 20, 2001
• 24 – 28 July 2017
• Archi Tacts Inc
• TOGAF 9 Combined Level 1 and 2 $3,000 - includes exam vouchers
• Denver, CO
13 Jul 2017 Colorado Springs ISSA Chapter 11
DoDAF
• C4ISR Architecture Framework v1.0 in 1996
• Developed in response to Clinger-Cohen Act
• Version 2.02, current since August 2010
Certified Enterprise Architect (CEA) Black Belt $11,000
Associate CEA Green Belt $5,500
Source: http://www.sabsa.org/node/72
13 Jul 2017 Colorado Springs ISSA Chapter 14
SABSA
Sherwood Applied Business Security Architecture (SABSA)
• Methodology for developing business-driven, risk and opportunity focused
Security Architectures at both enterprise and solutions level that traceably
support business objectives.
• Used for Information Assurance Architectures, Risk Management
Frameworks, and to align and seamlessly integrate security and risk
management into IT Architecture methods and frameworks.
[SABSA fills the gap for ‘security architecture’ and ‘security service management’
by integrating with TOGAF® and ITIL®.]
Source: http://www.sabsa.org/
Once the building type is defined, the owner must then specify more detail about its
use:
• Why do you want this building? The goals that you want to achieve.
• How will it be used? The detailed functional description.
• Who will use the building, including the types of people, their physical mobility, the
numbers of them expected, and so on?
• Where should it be located, and what is its geographical relationship to other
buildings and to the infrastructure (such as roads, railways etc)?
• When will it be used? The times of day / week / year, and the pattern of usage over
time.
$76.80 on Amazon
800-53 Security Control: The organization identifies critical information system components
and functions by performing a criticality analysis for [Assignment: organization-defined
information systems, information system components, or information system services] at
[Assignment: organization-defined decision points in the system development life cycle].
Supplemental Guidance: Criticality analysis is a key tenet of supply chain risk management and informs
the prioritization of supply chain protection activities such as attack surface reduction, use of all-
source intelligence, and tailored acquisition strategies. Information system engineers can conduct an
end-to-end functional decomposition of an information system to identify mission-critical functions
and components. The functional decomposition includes the identification of core organizational
missions supported by the system, decomposition into the specific functions to perform those
missions, and traceability to the hardware, software, and firmware components that implement those
functions, including when the functions are shared by many components within and beyond the
information system boundary. Information system components that allow for unmediated access to
critical components or functions are considered critical due to the inherent vulnerabilities such
components create. Criticality is assessed in terms of the impact of the function or component failure
on the ability of the component to complete the organizational missions supported by the information
system. A criticality analysis is performed whenever an architecture or design is being developed or
modified, including upgrades. Related controls: CP-2, PL-2, PL-8, PM-1, SA-8, SA-12, SA-13, SA-
15, SA-20.