0% found this document useful (0 votes)
148 views

ISSA, Colorado Springs Chapter: Enterprise Security Architecture

security architecture guide 2

Uploaded by

send_2me
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
148 views

ISSA, Colorado Springs Chapter: Enterprise Security Architecture

security architecture guide 2

Uploaded by

send_2me
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

ISSA, Colorado Springs Chapter

Enterprise Security Architecture


Kurt Danis, DAFC
CISSP-ISSEP
13 July 2017
Gov’t Wide IT Spending

14 years ago…
In a 2003 memo, Sen. Joseph Lieberman, D-Conn., said, "federal
agencies should be deriving better results from the $60 billion spent
annually on information technology. Much of that money is wasted on IT
systems that are redundant or obsolete." Moreover, Lieberman wrote,
"The lion's share of the $60 billion spent on IT is spent on service
contracts, and there is ample evidence to suggest that oversight of
these contracts has been deficient."

13 Jul 2017 Colorado Springs ISSA Chapter 2


13 Jul 2017 Colorado Springs ISSA Chapter 3
NIST Cybersecurity Risk
Framework
For the first time, this Budget includes discrete
cyber program investments that align budget
resources with the National Institute of
Standards and Technology (NIST) Cybersecurity
Framework. This will enable the alignment of
budget, risk, and performance data in a
consistent way across all Federal agencies.

Analytical Perspectives (OMB publication)


“Information Technology” chapter
Retrieved on 13Jul2017 from
https://www.whitehouse.gov/omb/budget/Analytical_Perspectives

13 Jul 2017 Colorado Springs ISSA Chapter 4


Agenda
1. Enterprise Architecture (EA) Purpose
2. Definitions
3. Legislation
4. EA Framework examples
a. Zachman Framework
b. TOGAF
c. DoDAF
5. EA for Security - SABSA

13 Jul 2017 Colorado Springs ISSA Chapter 5


Enterprise Architecture Purpose
Orchestrating the People, Operations, and Technology

DoD CIO, Terry Halverson


• Partnering w/industry… doesn’t mean selling us stuff

Director of the Navy Budget, VADM Thomas Church


• PPBE class, “Free puppy dog theory”

N-NC/J6 civilian leader IRT new continuous monitoring initiative


• “Technology is like a new baby. It’s fun making babies; and then comes
the responsibilities, care, planning, etc.”

13 Jul 2017 Colorado Springs ISSA Chapter 6


Security Architecture
Security Architecture – the art and science of designing and supervising the
construction of business systems, usually business information systems, which
are: free from danger, damage, etc.; free from fear, care, etc.; in safe custody;
not likely to fail; able to be relied upon; safe from attack.

Security Architect – a person qualified to design and supervise the


construction of secure business systems, usually secure business information
systems.

Definitions from p.2, Enterprise Security Architecture,


John Sherwood, Andrew Clark, David Lynas; published
by CMP books, 2005
13 Jul 2017 Colorado Springs ISSA Chapter 7
Rep. William Clinger, R-Pa Sen. William Cohen, R-Maine

Legislation
January 3, 1995 – January 3, 1997 January 24, 1997 – January 20, 2001

OMB CIRCULAR NO. A–11


PREPARATION, SUBMISSION, AND EXECUTION OF THE BUDGET
Section 240—Annual Performance Planning
• “Agencies must provide required data on total IT funding... consistent with the
overall agency budget submission, your agency enterprise architecture (EA),
your agency’s Agency IT Portfolio Summary, and your agency’s Major IT
Business Case submissions.”
• “The agency must further demonstrate how the investment supports a
business line or enterprise service performance goal as documented in the
agency’s enterprise architecture (EA), and annual Enterprise Roadmap
submission to OMB.”
• “How does the Annual Performance Plan relate to the agency’s enterprise
architecture? Once an agency’s performance plan is established, agencies
should ensure that the enterprise architecture planning documents are consistent
with achieving the agency goals and objectives.”

13 Jul 2017 Colorado Springs ISSA Chapter 8


Legislation
“For information technology investments, be consistent with Federal and agency
enterprise architectures which: integrate agency work processes and information flows
with technology to achieve the agency's strategic goals, reflect the agency's technology
vision, specify standards that enable information exchange and resource sharing while
retaining flexibility in the choice of suppliers and in the design of local work
processes, and ensure that security is built into and funded as part of the
enterprise architecture in accordance with OMB Memorandum M–00–07,
Incorporating and Funding Security in Information Systems Investments (February 28,
2000)”
-- Appendix 6, page 68, Capital Programming Guide, OMB Circular No. A–11 (2015)

13 Jul 2017 Colorado Springs ISSA Chapter 9


Zachman Framework
Zachman 4-Day Training Workshop - Colorado Springs:
July 18-21, 2017
Colorado Springs, CO
$3,499

13 Jul 2017 Colorado Springs ISSA Chapter 10


TOGAF
The Open Group Architecture Framework (TOGAF):
• Approach for designing, planning, implementing, and governing an enterprise
information technology architecture.
• TOGAF Architecture Development Method (ADM) based on the Technical
Architecture Framework for Information Management (TAFIM), a DoD
concept in the late 1980s
• Over 69,000 people with TOGAF 9 certifications
(https://togaf9-cert.opengroup.org/certified-individuals)
• TOGAF defines Architecture as:
• "formal description of a system, or a detailed plan of the system at
component level to guide its implementation", or as "the structure of
components, their interrelationships, and the principles and
guidelines governing their design and evolution over time.”

• 24 – 28 July 2017
• Archi Tacts Inc
• TOGAF 9 Combined Level 1 and 2  $3,000 - includes exam vouchers
• Denver, CO
13 Jul 2017 Colorado Springs ISSA Chapter 11
DoDAF
• C4ISR Architecture Framework v1.0 in 1996
• Developed in response to Clinger-Cohen Act
• Version 2.02, current since August 2010
Certified Enterprise Architect (CEA) Black Belt $11,000
Associate CEA Green Belt $5,500

Fees about 10% less for Government Employee

13 Jul 2017 Colorado Springs ISSA Chapter 12


SABSA
SABSA Chartered Security Architect - Foundation Certificate
(SCF)
Requires a candidate to pass 2 test modules consisting of 40
multiple choice questions. Each test module is of 60 minutes
duration.
• SABSA Security Strategy & Planning (Test Module F1)
• SABSA Security Service Management (Test Module F2)

SABSA Foundation (F1 & F2)


Dallas, TX
18 – 22 September 2017
$3,760
13 Jul 2017 Colorado Springs ISSA Chapter 13
The SABSA Institute
SABSA is governed by The SABSA Institute. In the United
Kingdom an “Institute” is not an ordinary company: it has a
protected and highly-regulated status that guarantees:
• SABSA intellectual property can never be sold
• SABSA will always remain vendor-neutral
• SABSA will be free-use in perpetuity
• SABSA will have ongoing development to meet the needs of business
• SABSA’s community can obtain true competency-based professional
certifications that provide trust and confidence to peers and employers of an
architect’s capabilities

Source: http://www.sabsa.org/node/72
13 Jul 2017 Colorado Springs ISSA Chapter 14
SABSA
Sherwood Applied Business Security Architecture (SABSA)
• Methodology for developing business-driven, risk and opportunity focused
Security Architectures at both enterprise and solutions level that traceably
support business objectives.
• Used for Information Assurance Architectures, Risk Management
Frameworks, and to align and seamlessly integrate security and risk
management into IT Architecture methods and frameworks.
[SABSA fills the gap for ‘security architecture’ and ‘security service management’
by integrating with TOGAF® and ITIL®.]

Source: http://www.sabsa.org/

13 Jul 2017 Colorado Springs ISSA Chapter 15


EA for Security -
Layered Architecture Views

The Business View Contextual Security Architecture


The Architect’s View Conceptual Security Architecture
The Designer’s View Logical Security Architecture
The Builder’s View Physical Security Architecture
The Tradesman’s View Component Security Architecture
The Service Manager’s View Security Service Management Architecture

13 Jul 2017 Colorado Springs ISSA Chapter 16


SABSA
The Business View
Owner establishes business requirements of WHAT must be met by the architecture.

Once the building type is defined, the owner must then specify more detail about its
use:

• Why do you want this building? The goals that you want to achieve.
• How will it be used? The detailed functional description.
• Who will use the building, including the types of people, their physical mobility, the
numbers of them expected, and so on?
• Where should it be located, and what is its geographical relationship to other
buildings and to the infrastructure (such as roads, railways etc)?
• When will it be used? The times of day / week / year, and the pattern of usage over
time.

13 Jul 2017 Colorado Springs ISSA Chapter 17


SABSA

13 Jul 2017 Colorado Springs ISSA Chapter 18


References
OMB Enterprise Architecture Assessment Framework
(https://www.whitehouse.gov/omb/e-gov/eaaf/ )

Federal Transition Framework


(http://www.egov.gov/ftf )

Federal Enterprise Architecture Reference Models


(https://www.whitehouse.gov/omb/e-gov/fea/ )

OMB Circular A-11


(http://www.whitehouse.gov/omb/circulars/a11/current_year/a11_toc.html )

Practical Guide to Federal Enterprise Architecture


(http://www.cio.gov/archive/bpeaguide.pdf )

Enterprise Security Architecture: A Business-Driven Approach


Hardcover – November 12, 2005
 by John Sherwood (Author), Andrew Clark (Author), David Lynas (Author)

 Hardcover: 608 pages

 $76.80 on Amazon

13 Jul 2017 Colorado Springs ISSA Chapter 19


Book Review posted on (ISC)2
By Christopher P. Blake,
***** (Very Good)

• Very much aligned to the Zachman Framework


• Not for the "feint-hearted” [i.e. not easy to read for casual reader]
• Builds concepts from the ground-up: using dictionary definitions and
[word] etymologies to fully explain what they mean
• As an architect: some things may have been better expressed through diagrams
• Authors appear to be 'showing-off…by utilising notations that are very academic
• Does not cover architectural styles such as Service Oriented Architecture (SOA)
• Book goes into extreme depth in certain areas where there is no practical advantage

“…some areas are perhaps too


deep and too academic, with other
areas arguably lacking…

13 Jul 2017 Colorado Springs ISSA Chapter 20


NIST Special Publication 800-53
Revision 4
SA-14 CRITICALITY ANALYSIS

800-53 Security Control: The organization identifies critical information system components
and functions by performing a criticality analysis for [Assignment: organization-defined
information systems, information system components, or information system services] at
[Assignment: organization-defined decision points in the system development life cycle].
Supplemental Guidance: Criticality analysis is a key tenet of supply chain risk management and informs
the prioritization of supply chain protection activities such as attack surface reduction, use of all-
source intelligence, and tailored acquisition strategies. Information system engineers can conduct an
end-to-end functional decomposition of an information system to identify mission-critical functions
and components. The functional decomposition includes the identification of core organizational
missions supported by the system, decomposition into the specific functions to perform those
missions, and traceability to the hardware, software, and firmware components that implement those
functions, including when the functions are shared by many components within and beyond the
information system boundary. Information system components that allow for unmediated access to
critical components or functions are considered critical due to the inherent vulnerabilities such
components create. Criticality is assessed in terms of the impact of the function or component failure
on the ability of the component to complete the organizational missions supported by the information
system. A criticality analysis is performed whenever an architecture or design is being developed or
modified, including upgrades. Related controls: CP-2, PL-2, PL-8, PM-1, SA-8, SA-12, SA-13, SA-
15, SA-20.

13 Jul 2017 Colorado Springs ISSA Chapter 21


NISTIR 8179 (DRAFT)
Criticality Analysis Process Model: Prioritizing Systems And Components

13 Jul 2017 Colorado Springs ISSA Chapter 22


NISTIR 8179 (DRAFT)
C. Conduct System/Subsystem-Level Criticality Analysis

13 Jul 2017 Colorado Springs ISSA Chapter 23


EA Certification Resources

Zachman International® SABSA training


2222 Foothill Blvd, Suite 337
La Cañada, CA 91011 David Lynas Consulting Limited
866.518.4340 x102 17 Ensign House
http://www.Zachman.com Admirals Way
Canary Wharf
FEAC™ Institute (DoDAF & FEAF) London E14 9XQ
15954 Jackson Creek Pkwy, Ste B463 United Kingdom
Monument, CO 80132 T: +44 207 863 7834
F: +44 207 863 7510
The Open Group (i.e. TOGAF) training@sabsacourses.com
8 New England Executive Park, Suite 150
Burlington MA 01803-5007
1-781-564-9200

13 Jul 2017 Colorado Springs ISSA Chapter 24

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy