SlideShare a Scribd company logo
Information Security and Security Architecture: Two Complementary Ambits The   Open Group 3 rd  Security Practitioners Conference July 22 – 23, 2009 Toronto, Ontario   Murray Rosenthal, CISA Risk Management & Information Security I&T Strategic Planning & Architecture City of Toronto [email_address]
Problem Statement: Intent vs. Reality Intent Organizations stand up information security and security architecture as essential risk management practices, in line with “due care” standards. Requirement to design, develop and stand up programmatic approaches to information security on an authoritative, sustainable basis. Requirement to design, develop and deploy systems that comply with generally accepted architectural standards. Reality Obfuscation of practice “edges”. Obfuscation of organizational spans of control. Obfuscation of authority. Obfuscation of professional skill sets. Information security ≠ security architecture. Security architecture ≠ information security. Ready-Fire-Aim. Absence of a strategic plan and strategic planning for information security and security architecture.
 
 
 
 
Generally Accepted INFOSEC Assertions Confidentiality Integrity Availability Data-centric Identification Authentication Authorization Entity-centric ( h uman/system ) Non-repudiation Information Security Ecosystem Attribution Information Security Ecosystem Sustainability Risk - based Subsystems Data - centric Scalability Persistence Pervasiveness Organic INFOSEC Ecosystem Sustainable Risk - based Subsystems Data-centric Scalable Persistent Boundaryless Pervasive Organic INFOSEC Ecosystem Risk Mitigation Approaches Deterrence Avoidance Acceptance Transfer Recovery Restoration
 
Generally Accepted INFOSEC Assertions Confidentiality Integrity Availability Data-centric Identification Authentication Authorization Entity-centric ( h uman/system ) Non-repudiation Risk Mitigation Approaches Deterrence Avoidance Acceptance Transfer Recovery Restoration Reviewed and Audited Planned, Managed, Measurable and Measured Development Lifecycle Requirement Staff Aware and Trained Adequate Resources Committed Addressed and Enforced in Policy Roles Responsibilities, Segregation of Duties Risk-based Viewed as a Business Requirement. Accountable Leaders Enterprise- wide INFOSEC Governance Information Security Governance Attribution Information Security Governance
 
 
 
S E C U R I T Y A R C H I T E C T U R E
If You Don’t Have Security Architecture… Project Level Program Level Let the project lapse and not go forward Lack of artefacts = lack of security design credibility. Let the enterprise go out of business Security architecture becomes a poster child as the business tailspins out of control. Reverse-engineer the project’s “as is” models Takes time and costs money. Reverse-engineer the enterprise’s “as is” models from the existing enterprise Takes time and costs money. Trial-and-Error Application of security artefacts is ad hoc, or not at all. Trial-and-Error Security artefacts are created informally, or not at all, and are not authoritative.
SABSA Framework Security Operations Schedule Security of Sites, Networks and Platforms Application and User Management and Support Security Service Management and Support Operational Risk Management Assurance of Operational Continuity Operational Security Step Timing and Sequencing Processes, Nodes, Addresses and Protocols Identities, Functions, Action and ACLs Security Products and Tools Security Standards Detailed Data Structures Component Control Structure Execution Platform and Network Infrastructure Users, Applications and the User Interface Security Mechanisms Security Rules, Practices & Procedures Business Data Model Physical Security Processing Cycle Security Domain Definitions and Associations Entity Schema and Privilege Profiles Security Services Security Policies Business Information Model Logical Security-Related Lifetimes and Deadlines Security Domain Model Security Entity Model and Trust Framework Security Strategies and Architectural Layering Control Objectives Business Attributes Profile Conceptual Business Time Dependencies Business Geography Business Organization and Relationships Business Process Model Business Risk Model The Business Contextual Time (When) Location (Where) People (Who) Process (How) Motivation (Why) Assets (What)
Disentangling Two Complementary Ambits
Conceptual Reference Model
Harvestable Nuggets  Develop strategic plans and implementation schedules for information security and security architecture, respectively.  Disentangle spans of control and authorities.  Institute practice “edge” management and anti-collision protocols.  Recruit based on differentiated skill sets and practice requirements.
Information Security and Security Architecture: Two Complementary Ambits The   Open Group 3 rd  Security Practitioners Conference July 22 – 23, 2009 Toronto, Ontario   Murray Rosenthal, CISA Risk Management & Information Security I&T Strategic Planning & Architecture City of Toronto [email_address]

More Related Content

PPTX
Strategically moving towards a secure hybrid it
PPT
Ea Relationship To Security And The Enterprise V1
 
PPTX
Does Anyone Remember Enterprise Security Architecture?
PPTX
SOC for Cybersecurity Overview
PDF
What is Enterprise Security Architecture (ESA)?
DOCX
The NIST Cybersecurity Framework
PPTX
Enterprise Architecture and Information Security
PPTX
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Strategically moving towards a secure hybrid it
Ea Relationship To Security And The Enterprise V1
 
Does Anyone Remember Enterprise Security Architecture?
SOC for Cybersecurity Overview
What is Enterprise Security Architecture (ESA)?
The NIST Cybersecurity Framework
Enterprise Architecture and Information Security
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...

What's hot (20)

PDF
Building an effective Information Security Roadmap
PDF
Requirements for Implementing Data-Centric ABAC
PDF
Building A Security Operations Center
PDF
Addressing Gaps in Your Cyber Security
PPTX
Pasta Threat Modeling
PDF
New technologies - Amer Haza'a
PPTX
CyberSecurity Strategy For Defendable ROI
PDF
Business case for information security program
PPTX
What is Security Orchestration?
DOCX
mcdonald.thomas.resume11-15
DOCX
Information Systems Security & Strategy
PDF
Enterprise Security Architecture
PDF
Ibm cognitive security_white_paper_04_2016
PPTX
Cybersecurity Audit
PDF
Enterprise%20 security%20architecture%20 %20business%20driven%20security
PPTX
Security Orchestration, Automation & Incident Response
PPT
Security Consulting Methodology
DOCX
So you want to be a CISO - 5 steps to Success
PPTX
Security Orchestration Made Simple
Building an effective Information Security Roadmap
Requirements for Implementing Data-Centric ABAC
Building A Security Operations Center
Addressing Gaps in Your Cyber Security
Pasta Threat Modeling
New technologies - Amer Haza'a
CyberSecurity Strategy For Defendable ROI
Business case for information security program
What is Security Orchestration?
mcdonald.thomas.resume11-15
Information Systems Security & Strategy
Enterprise Security Architecture
Ibm cognitive security_white_paper_04_2016
Cybersecurity Audit
Enterprise%20 security%20architecture%20 %20business%20driven%20security
Security Orchestration, Automation & Incident Response
Security Consulting Methodology
So you want to be a CISO - 5 steps to Success
Security Orchestration Made Simple
Ad

Similar to Open group spc rosenthal v3 (20)

PPTX
Cissp- Security and Risk Management
PDF
CCA study group
PDF
Cybersecurity_Security_architecture_2023.pdf
PPTX
CISSP- Security & Risk Management-Domain 1 Overview-Edited.pptx
PPTX
Security architecture frameworks
PPT
II Security At Microsoft
PDF
Exploration Draft Document- CEM Machine Learning & AI Project 2018
PPTX
Architecture centric support for security orchestration and automation
PPTX
PPT
Developing an Information Security Program
PDF
Cyber Security Risk Mitigation Checklist
PPT
SOC presentation- Building a Security Operations Center
PDF
Application Security Maturity Model
PPTX
MS. Cybersecurity Reference Architecture
PPT
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
PPTX
Optimizing Security Operations: 5 Keys to Success
PPT
Convergence innovative integration of security
DOCX
Security architecture principles isys 0575general att
PDF
SMB270: Security Essentials for ITSM
PDF
Security_by_Design.pdf
Cissp- Security and Risk Management
CCA study group
Cybersecurity_Security_architecture_2023.pdf
CISSP- Security & Risk Management-Domain 1 Overview-Edited.pptx
Security architecture frameworks
II Security At Microsoft
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Architecture centric support for security orchestration and automation
Developing an Information Security Program
Cyber Security Risk Mitigation Checklist
SOC presentation- Building a Security Operations Center
Application Security Maturity Model
MS. Cybersecurity Reference Architecture
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
Optimizing Security Operations: 5 Keys to Success
Convergence innovative integration of security
Security architecture principles isys 0575general att
SMB270: Security Essentials for ITSM
Security_by_Design.pdf
Ad

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation theory and applications.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Modernizing your data center with Dell and AMD
The Rise and Fall of 3GPP – Time for a Sabbatical?
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Cloud computing and distributed systems.
Encapsulation theory and applications.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
20250228 LYD VKU AI Blended-Learning.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced methodologies resolving dimensionality complications for autism neur...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
Empathic Computing: Creating Shared Understanding
NewMind AI Monthly Chronicles - July 2025
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
A Presentation on Artificial Intelligence
Modernizing your data center with Dell and AMD

Open group spc rosenthal v3

  • 1. Information Security and Security Architecture: Two Complementary Ambits The Open Group 3 rd Security Practitioners Conference July 22 – 23, 2009 Toronto, Ontario Murray Rosenthal, CISA Risk Management & Information Security I&T Strategic Planning & Architecture City of Toronto [email_address]
  • 2. Problem Statement: Intent vs. Reality Intent Organizations stand up information security and security architecture as essential risk management practices, in line with “due care” standards. Requirement to design, develop and stand up programmatic approaches to information security on an authoritative, sustainable basis. Requirement to design, develop and deploy systems that comply with generally accepted architectural standards. Reality Obfuscation of practice “edges”. Obfuscation of organizational spans of control. Obfuscation of authority. Obfuscation of professional skill sets. Information security ≠ security architecture. Security architecture ≠ information security. Ready-Fire-Aim. Absence of a strategic plan and strategic planning for information security and security architecture.
  • 3.  
  • 4.  
  • 5.  
  • 6.  
  • 7. Generally Accepted INFOSEC Assertions Confidentiality Integrity Availability Data-centric Identification Authentication Authorization Entity-centric ( h uman/system ) Non-repudiation Information Security Ecosystem Attribution Information Security Ecosystem Sustainability Risk - based Subsystems Data - centric Scalability Persistence Pervasiveness Organic INFOSEC Ecosystem Sustainable Risk - based Subsystems Data-centric Scalable Persistent Boundaryless Pervasive Organic INFOSEC Ecosystem Risk Mitigation Approaches Deterrence Avoidance Acceptance Transfer Recovery Restoration
  • 8.  
  • 9. Generally Accepted INFOSEC Assertions Confidentiality Integrity Availability Data-centric Identification Authentication Authorization Entity-centric ( h uman/system ) Non-repudiation Risk Mitigation Approaches Deterrence Avoidance Acceptance Transfer Recovery Restoration Reviewed and Audited Planned, Managed, Measurable and Measured Development Lifecycle Requirement Staff Aware and Trained Adequate Resources Committed Addressed and Enforced in Policy Roles Responsibilities, Segregation of Duties Risk-based Viewed as a Business Requirement. Accountable Leaders Enterprise- wide INFOSEC Governance Information Security Governance Attribution Information Security Governance
  • 10.  
  • 11.  
  • 12.  
  • 13. S E C U R I T Y A R C H I T E C T U R E
  • 14. If You Don’t Have Security Architecture… Project Level Program Level Let the project lapse and not go forward Lack of artefacts = lack of security design credibility. Let the enterprise go out of business Security architecture becomes a poster child as the business tailspins out of control. Reverse-engineer the project’s “as is” models Takes time and costs money. Reverse-engineer the enterprise’s “as is” models from the existing enterprise Takes time and costs money. Trial-and-Error Application of security artefacts is ad hoc, or not at all. Trial-and-Error Security artefacts are created informally, or not at all, and are not authoritative.
  • 15. SABSA Framework Security Operations Schedule Security of Sites, Networks and Platforms Application and User Management and Support Security Service Management and Support Operational Risk Management Assurance of Operational Continuity Operational Security Step Timing and Sequencing Processes, Nodes, Addresses and Protocols Identities, Functions, Action and ACLs Security Products and Tools Security Standards Detailed Data Structures Component Control Structure Execution Platform and Network Infrastructure Users, Applications and the User Interface Security Mechanisms Security Rules, Practices & Procedures Business Data Model Physical Security Processing Cycle Security Domain Definitions and Associations Entity Schema and Privilege Profiles Security Services Security Policies Business Information Model Logical Security-Related Lifetimes and Deadlines Security Domain Model Security Entity Model and Trust Framework Security Strategies and Architectural Layering Control Objectives Business Attributes Profile Conceptual Business Time Dependencies Business Geography Business Organization and Relationships Business Process Model Business Risk Model The Business Contextual Time (When) Location (Where) People (Who) Process (How) Motivation (Why) Assets (What)
  • 18. Harvestable Nuggets  Develop strategic plans and implementation schedules for information security and security architecture, respectively.  Disentangle spans of control and authorities.  Institute practice “edge” management and anti-collision protocols.  Recruit based on differentiated skill sets and practice requirements.
  • 19. Information Security and Security Architecture: Two Complementary Ambits The Open Group 3 rd Security Practitioners Conference July 22 – 23, 2009 Toronto, Ontario Murray Rosenthal, CISA Risk Management & Information Security I&T Strategic Planning & Architecture City of Toronto [email_address]

Editor's Notes

  • #18: The schematic is a conceptual reference model that recognizes both EA and non-EA deliverables within a generalized organizational context. The model acknowledges that, in complex organizations, there is a need for both (a) information security practitioners who are focused on sustainable and authoritative INFOSEC program development and (b) security architects who are responsible for the design and on-going care-and-feeding of artefacts used to construct complex systems. These artefacts are owned and operated by security architects and are “pure play” security abstractions that directly affect security posture considerations in system construction. This set of security architecture artefacts are vertical in their orientation. There is another set of artefacts, owned and operated by business, information, application and technology domain architects, that contain security architecture representations or consideration points. For example, a technology domain architect contains an interoperability specification standard into which security architecture requirements are infused. An application architect publishes a specification that externalizes all applicable web services. The security architect infuses the specification with security architecture considerations. In these situations, security architecture is said to be horizontal .