SlideShare a Scribd company logo
2
Most read
6
Most read
10
Most read
A Practical Example to Using SABSA
Extended Security-in-Depth Strategy
Allen Baranov
Who Am I?
Allen Baranov, CISSP
Information Security Professional
SABSA Foundation Certified
Specialist In Security Management, Security Architecture and
Risk and Compliance
Looking for new permanent position!
See LinkedIn for more details or email me for more information!
au.linkedin.com/in/allenbaranov/
This is my proposal for an extended Security-in-Depth Strategy. It is based on the
one in the official SABSA documentation but extended to be more practical as
you’ll see later in this presentation.
Assurance • Deter
• InviteNegotiate
• Prevent
• AllowEnforcement
• Contain (Deny)
• (Continue to) Allow
Post Breach
Enforcement
• Detect and Notify
• Detect and Process (Service)Activity Monitoring
• Evidence & Track
• Baseline and service improvementTraffic Monitoring
• Recover and Restore
• Monitor and Optimise (Hierarchical Storage Management)
Data Availability
Maint.
Extended SABSA Security-in-Depth Strategy
Deter
Prevent
Contain
Detect and Notify
Evidence & Track
Recover + Restore
Assure
Original SABSA Security-in-Depth Strategy
This is the original SABSA S-i-D Strategy diagram. You will see that it has “negative”
actions which (IMHO) doesn’t fit with the SABSA risk/opportunity philosophy.
… so I extended it. For each negative action, there is a positive one and I have
grouped them into 6 groups. I moved Assurance to its own super group with each
level feeding back to it. This is still a WIP and I am keen for feedback.
Assurance • Deter
• InviteNegotiate
• Prevent
• AllowEnforcement
• Contain (Deny)
• (Continue to) Allow
Post Breach
Enforcement
• Detect and Notify
• Detect and Process (Service)Activity Monitoring
• Evidence & Track
• Baseline and service improvementTraffic Monitoring
• Recover and Restore
• Monitor and Optimise (Hierarchical Storage Management)
Data Availability
Maint.
Extended SABSA Security-in-Depth Strategy
Deconstructing the purpose of a Firewall.
• Operates on the network layer.
• It usually defines the border between two networks of differing
levels of risk.
• It investigates traffic and makes decisions on how to pass the traffic
based on predefined rules (known as rulebase or policy)
• It can be used for tracking connectivity.
• Firewalls may also do deeper inspection into network traffic and
Firewalls may be physical hardware, software, dedicated boxes, a
service or a virtual machine.
Practical Example - Firewalls
I extended it so as to come up with a practical way to use SABSA for writing a
Firewall Standard. The first thing to do is to work out exactly what a Firewall is
aiming to achieve. Then to fit it into the 6 layers of the model. See next slide.
•Deter – create logical border between networks
•Invite authorised traffic to be used for business purposes
Negotiate Network
Usage
•Prevent – prevent unauthorised traffic from flowing across the network boundary
•Allow – allow authorised (business enhancing) traffic across the network boundary.
Enforcement of
predefined rules
•Contain (Deny) – Temporarily stop a compromised network leaking onto a “clean” network.
•(Continue to) Allow “clean” networks to communicate until a breach is detected.
Post Breach Network
Management
•Detect and Notify – monitor all traffic and notify of suspicious traffic.
•Detect and Process – allow network traffic to pass and baseline “normal”
Network Activity
Monitoring
•Evidence & Track – watch for anomalies on traffic flow and suspicious connections to build a profile of activities.
•Baseline and service improvement – watch for opportunities to improve connectivity and gain understanding of
network usage across the org.
Network Traffic
Monitoring
•Recover and Restore – have redundant devices and network connections with automatic service continuation.
•Monitor and Optimise – Look for opportunities for reducing speed in some connections and increasing speed for
others.
Network Availability
Maint.
Practical Example - Firewalls
I then took each layer and this became a section in the Standard. Note that
especially the “Negotiate” section should be written as a contract with both what
will be delivered and what is expected.
This way the Standards can be more comprehensive.
They are also not so negative and they show the balance of what is needed
for compliance and security against what is offered.
The firewall standard, for example, shows that without a firewall all the
benefits of the Internet would not be available.
Also, while we are monitoring for bad traffic, we could also be monitoring for
performance.
There is one more major advantage that turns the whole SABSA philosophy
on its head but I will save that one for next time… ;)
For more, visit my blog – http://securethink.blogspot.com.au
…other bits and pieces
What is SABSA?
SABSA is a proven framework and methodology for Enterprise Security Architecture and Service Management
used successfully by numerous organisations around the world. Now used globally to meet a wide variety of
Enterprise needs including Risk Management, Information Assurance, Governance, and Continuity
Management, SABSA has evolved since 1995 to be the 'approach of choice' for commercial organisations and
Government alike.
SABSA ensures that the needs of your enterprise are met completely and that security services are designed,
delivered and supported as an integral part of your business and IT management infrastructure.
Although copyright protected, SABSA is an open-use methodology, not a commercial product.
Images
All images are used with permission. Some are from the site stock.xchng (http://www.sxc.hu/)

More Related Content

PPTX
Modelling Security Architecture
PPTX
Conceptual security architecture
PDF
SABSA vs. TOGAF in a RMF NIST 800-30 context
PPTX
Adaptive Enterprise Security Architecture
PPT
SABSA - Business Attributes Profiling
PDF
Enterprise Security Architecture for Cyber Security
PDF
Security-by-Design in Enterprise Architecture
PPTX
Security architecture frameworks
Modelling Security Architecture
Conceptual security architecture
SABSA vs. TOGAF in a RMF NIST 800-30 context
Adaptive Enterprise Security Architecture
SABSA - Business Attributes Profiling
Enterprise Security Architecture for Cyber Security
Security-by-Design in Enterprise Architecture
Security architecture frameworks

What's hot (20)

PPTX
SABSA Implementation(Part VI)_ver1-0
PPTX
SABSA Implementation(Part I)_ver1-0
PPTX
Enterprise Security Architecture Design
PPTX
SABSA overview
PPTX
SABSA Implementation(Part III)_ver1-0
PDF
Security review using SABSA
PPTX
SABSA Implementation(Part V)_ver1-0
PPTX
SABSA Implementation(Part IV)_ver1-0
PPTX
SABSA Implementation(Part II)_ver1-0
PDF
Practical Enterprise Security Architecture
PDF
Enterprise Security Architecture
PDF
Cybersecurity roadmap : Global healthcare security architecture
PDF
Information Security Architecture: Building Security Into Your Organziation
PDF
SABSA white paper
PPTX
Enterprise Security Architecture
PDF
Cybersecurity Roadmap Development for Executives
PDF
Industrial_Cyber_Security
PPTX
What is a secure enterprise architecture roadmap?
PDF
Enterprise Security Architecture
PDF
TOGAF 9 - Security Architecture Ver1 0
SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part I)_ver1-0
Enterprise Security Architecture Design
SABSA overview
SABSA Implementation(Part III)_ver1-0
Security review using SABSA
SABSA Implementation(Part V)_ver1-0
SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part II)_ver1-0
Practical Enterprise Security Architecture
Enterprise Security Architecture
Cybersecurity roadmap : Global healthcare security architecture
Information Security Architecture: Building Security Into Your Organziation
SABSA white paper
Enterprise Security Architecture
Cybersecurity Roadmap Development for Executives
Industrial_Cyber_Security
What is a secure enterprise architecture roadmap?
Enterprise Security Architecture
TOGAF 9 - Security Architecture Ver1 0
Ad

Similar to A Practical Example to Using SABSA Extended Security-in-Depth Strategy (20)

PPT
Mcs2453 aniq mc101053-assignment2
PDF
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
PDF
Looking for Trouble on OT Networks.pdf
PDF
Sonic WALL Secure Wireless Network Integrated Solutions Guide 1st Edition Joe...
PDF
Understanding security operation.pptx
PDF
Co se skrývá v datovém provozu? - Pavel Minařík
DOCX
White Paper Security and High Availability Concerns with Wide Area Networks
DOCX
White Paper Security and High Availability Concerns with Wide Area Networks
PDF
SBA Live Academy: Software Security – Towards a Mature Lifecycle and DevSecOp...
PDF
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
PDF
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
PDF
SecurityGen's Pioneering Approach to 5G Security Services
PPTX
Detect Threats Faster
PDF
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
PPTX
SASE The Next Step in Network Security Evolution.pptx
PPTX
Network Security of Data Protection
PDF
The Golden Rules - Detecting more with RSA Security Analytics
PPTX
Security architecture, engineering and operations
PDF
Are you ready for the next attack? Reviewing the SP Security Checklist
PDF
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Mcs2453 aniq mc101053-assignment2
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Looking for Trouble on OT Networks.pdf
Sonic WALL Secure Wireless Network Integrated Solutions Guide 1st Edition Joe...
Understanding security operation.pptx
Co se skrývá v datovém provozu? - Pavel Minařík
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
SBA Live Academy: Software Security – Towards a Mature Lifecycle and DevSecOp...
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
SecurityGen's Pioneering Approach to 5G Security Services
Detect Threats Faster
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
SASE The Next Step in Network Security Evolution.pptx
Network Security of Data Protection
The Golden Rules - Detecting more with RSA Security Analytics
Security architecture, engineering and operations
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Ad

Recently uploaded (20)

PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
A Brief Introduction About Julia Allison
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PDF
Laughter Yoga Basic Learning Workshop Manual
PPTX
HR Introduction Slide (1).pptx on hr intro
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PPT
Chapter four Project-Preparation material
DOCX
Business Management - unit 1 and 2
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PDF
IFRS Notes in your pocket for study all the time
PPTX
Amazon (Business Studies) management studies
PDF
Types of control:Qualitative vs Quantitative
DOCX
Euro SEO Services 1st 3 General Updates.docx
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
Training And Development of Employee .pdf
PDF
How to Get Funding for Your Trucking Business
PPT
Data mining for business intelligence ch04 sharda
PDF
Nidhal Samdaie CV - International Business Consultant
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
A Brief Introduction About Julia Allison
Roadmap Map-digital Banking feature MB,IB,AB
Laughter Yoga Basic Learning Workshop Manual
HR Introduction Slide (1).pptx on hr intro
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Chapter four Project-Preparation material
Business Management - unit 1 and 2
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
IFRS Notes in your pocket for study all the time
Amazon (Business Studies) management studies
Types of control:Qualitative vs Quantitative
Euro SEO Services 1st 3 General Updates.docx
unit 1 COST ACCOUNTING AND COST SHEET
Training And Development of Employee .pdf
How to Get Funding for Your Trucking Business
Data mining for business intelligence ch04 sharda
Nidhal Samdaie CV - International Business Consultant

A Practical Example to Using SABSA Extended Security-in-Depth Strategy

  • 1. A Practical Example to Using SABSA Extended Security-in-Depth Strategy Allen Baranov
  • 2. Who Am I? Allen Baranov, CISSP Information Security Professional SABSA Foundation Certified Specialist In Security Management, Security Architecture and Risk and Compliance Looking for new permanent position! See LinkedIn for more details or email me for more information! au.linkedin.com/in/allenbaranov/
  • 3. This is my proposal for an extended Security-in-Depth Strategy. It is based on the one in the official SABSA documentation but extended to be more practical as you’ll see later in this presentation. Assurance • Deter • InviteNegotiate • Prevent • AllowEnforcement • Contain (Deny) • (Continue to) Allow Post Breach Enforcement • Detect and Notify • Detect and Process (Service)Activity Monitoring • Evidence & Track • Baseline and service improvementTraffic Monitoring • Recover and Restore • Monitor and Optimise (Hierarchical Storage Management) Data Availability Maint. Extended SABSA Security-in-Depth Strategy
  • 4. Deter Prevent Contain Detect and Notify Evidence & Track Recover + Restore Assure Original SABSA Security-in-Depth Strategy This is the original SABSA S-i-D Strategy diagram. You will see that it has “negative” actions which (IMHO) doesn’t fit with the SABSA risk/opportunity philosophy.
  • 5. … so I extended it. For each negative action, there is a positive one and I have grouped them into 6 groups. I moved Assurance to its own super group with each level feeding back to it. This is still a WIP and I am keen for feedback. Assurance • Deter • InviteNegotiate • Prevent • AllowEnforcement • Contain (Deny) • (Continue to) Allow Post Breach Enforcement • Detect and Notify • Detect and Process (Service)Activity Monitoring • Evidence & Track • Baseline and service improvementTraffic Monitoring • Recover and Restore • Monitor and Optimise (Hierarchical Storage Management) Data Availability Maint. Extended SABSA Security-in-Depth Strategy
  • 6. Deconstructing the purpose of a Firewall. • Operates on the network layer. • It usually defines the border between two networks of differing levels of risk. • It investigates traffic and makes decisions on how to pass the traffic based on predefined rules (known as rulebase or policy) • It can be used for tracking connectivity. • Firewalls may also do deeper inspection into network traffic and Firewalls may be physical hardware, software, dedicated boxes, a service or a virtual machine. Practical Example - Firewalls I extended it so as to come up with a practical way to use SABSA for writing a Firewall Standard. The first thing to do is to work out exactly what a Firewall is aiming to achieve. Then to fit it into the 6 layers of the model. See next slide.
  • 7. •Deter – create logical border between networks •Invite authorised traffic to be used for business purposes Negotiate Network Usage •Prevent – prevent unauthorised traffic from flowing across the network boundary •Allow – allow authorised (business enhancing) traffic across the network boundary. Enforcement of predefined rules •Contain (Deny) – Temporarily stop a compromised network leaking onto a “clean” network. •(Continue to) Allow “clean” networks to communicate until a breach is detected. Post Breach Network Management •Detect and Notify – monitor all traffic and notify of suspicious traffic. •Detect and Process – allow network traffic to pass and baseline “normal” Network Activity Monitoring •Evidence & Track – watch for anomalies on traffic flow and suspicious connections to build a profile of activities. •Baseline and service improvement – watch for opportunities to improve connectivity and gain understanding of network usage across the org. Network Traffic Monitoring •Recover and Restore – have redundant devices and network connections with automatic service continuation. •Monitor and Optimise – Look for opportunities for reducing speed in some connections and increasing speed for others. Network Availability Maint. Practical Example - Firewalls
  • 8. I then took each layer and this became a section in the Standard. Note that especially the “Negotiate” section should be written as a contract with both what will be delivered and what is expected.
  • 9. This way the Standards can be more comprehensive. They are also not so negative and they show the balance of what is needed for compliance and security against what is offered. The firewall standard, for example, shows that without a firewall all the benefits of the Internet would not be available. Also, while we are monitoring for bad traffic, we could also be monitoring for performance. There is one more major advantage that turns the whole SABSA philosophy on its head but I will save that one for next time… ;) For more, visit my blog – http://securethink.blogspot.com.au
  • 10. …other bits and pieces What is SABSA? SABSA is a proven framework and methodology for Enterprise Security Architecture and Service Management used successfully by numerous organisations around the world. Now used globally to meet a wide variety of Enterprise needs including Risk Management, Information Assurance, Governance, and Continuity Management, SABSA has evolved since 1995 to be the 'approach of choice' for commercial organisations and Government alike. SABSA ensures that the needs of your enterprise are met completely and that security services are designed, delivered and supported as an integral part of your business and IT management infrastructure. Although copyright protected, SABSA is an open-use methodology, not a commercial product. Images All images are used with permission. Some are from the site stock.xchng (http://www.sxc.hu/)