SlideShare a Scribd company logo
12
Most read
15
Most read
16
Most read
SABSA Implementation
Generic Approach
PART III
ARCHITECTURAL STRATEGIES
Scope: Strategy & Planning Phase -
Process
Alignment, Integration & Compliance Strategy
• Understand what needs to be aligned, to what
purpose, and where it is positioned within the SABSA
framework
• Business model or business process framework
• Legislation, regulation or governance frameworks
• Risk management methods, assurance framework or
audit approach
• IT Architecture framework or method
• Controls framework, library or standard
• Performance management & reporting framework
• Etc.
Strategy & Planning Phase Alignment
Risk Management Method Alignment
Performance & Reporting Methods
Control Objectives Libraries &
Standards
Controls Frameworks & Libraries
Generic Defense in Depth Layering
SABSA Defence-in-Depth Principles
• No single point of failure
• The architectural structure of the controls set improves
security
– The value of the whole is greater than the sum of the individual parts
– Combinations of sensible measures in a collection of well designed
control domains can deliver reasonable security
• Without ‘rocket science’
• Without over-expenditure
– The control domain structures themselves add value to overall security
Multi-tiered Controls Strategy - Capabilities
• Over-investment in preventative measures results in
prevention of business and opportunity
• SABSA multi-tiered control strategy provides assurance
of security capabilities (in design or in review/audit):
– Risk-proportional capability to Deter
– Risk-proportional capability to Prevent
– Risk-proportional capability to Contain
– Risk-proportional capability to Detect
– Risk-proportional capability to Track
– Risk-proportional capability to Recover
– Risk-proportional capability to Assure the other
capabilities
SABSA Multi-tiered Control Strategy
Application of Multi-tiered Controls In Risk
• The multi-tiered controls strategy is modeled against
the risk assessment to determine proportional and
appropriate response
• Contributes to selection of the right control in the right
place at the right time
• Enables further removal of subjectivity in selection of
Risk Treatments
• Facilitates construction of databases and risk
management tools that respond to definitive risk
scenarios with definitive control decisions
• Increases speed and ease of use of Risk Assessment
Application of SABSA Multi-tier Control
Application of Multi-tiered Control Strategy
END OF PART III

More Related Content

PPTX
SABSA Implementation(Part I)_ver1-0
PPTX
SABSA Implementation(Part V)_ver1-0
PDF
Security review using SABSA
PDF
SABSA vs. TOGAF in a RMF NIST 800-30 context
PPTX
SABSA Implementation(Part IV)_ver1-0
PPTX
SABSA Implementation(Part VI)_ver1-0
PPTX
SABSA Implementation(Part II)_ver1-0
PPTX
SABSA overview
SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part V)_ver1-0
Security review using SABSA
SABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part II)_ver1-0
SABSA overview

What's hot (20)

PPTX
Modelling Security Architecture
PDF
Enterprise Security Architecture
PPT
SABSA - Business Attributes Profiling
PDF
SABSA white paper
PPTX
Adaptive Enterprise Security Architecture
PPTX
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
PPTX
Security architecture frameworks
PPTX
Enterprise Security Architecture Design
PDF
Enterprise Security Architecture for Cyber Security
PDF
Practical Enterprise Security Architecture
PDF
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
PPTX
Enterprise Security Architecture
PPTX
Conceptual security architecture
PDF
Security-by-Design in Enterprise Architecture
PDF
Enterprise Security Architecture
PDF
TOGAF 9 - Security Architecture Ver1 0
PPTX
What is a secure enterprise architecture roadmap?
PDF
Cybersecurity Roadmap Development for Executives
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PPTX
ISA/IEC 62443: Intro and How To
Modelling Security Architecture
Enterprise Security Architecture
SABSA - Business Attributes Profiling
SABSA white paper
Adaptive Enterprise Security Architecture
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
Security architecture frameworks
Enterprise Security Architecture Design
Enterprise Security Architecture for Cyber Security
Practical Enterprise Security Architecture
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Enterprise Security Architecture
Conceptual security architecture
Security-by-Design in Enterprise Architecture
Enterprise Security Architecture
TOGAF 9 - Security Architecture Ver1 0
What is a secure enterprise architecture roadmap?
Cybersecurity Roadmap Development for Executives
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
ISA/IEC 62443: Intro and How To
Ad

Similar to SABSA Implementation(Part III)_ver1-0 (20)

PPTX
**"Effective Cloud Service Strategy for Growth"**
PPT
SLVA - Security monitoring and reporting itweb workshop
PPTX
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
PDF
What Are the Best Practices for IT Infrastructure Operations.pdf
PDF
Introduction to SABSA for BAs - Sac Valley IIBA 09.20.17 FINAL.pdf
PPTX
HITRUST Certification
PPTX
uses_and_benefits_of_framework based on NIST
PPTX
ASSET INTEGRITY MANAGEMENT SYSTEM-BOOK.pptx
PPTX
Cybersecurity Risk Management Program and Your Organization
PPTX
IT Security Bachelor in information technology.pptx
PDF
Effective Strategies for Software Architecture Auditing
PPTX
ESA for Business
PPTX
Information Security Blueprint
PDF
Cissp classroom program ievision
PPT
Internal financial control - how ready are you - Webinar
PPT
Secure Software Development Models and Methods integrated with CMMI.ppt
PPTX
Webinar | Asset Management Health Check
PDF
CISSP Training Program
PDF
Establishing the Core of an Effective Technology Risk Management Program
**"Effective Cloud Service Strategy for Growth"**
SLVA - Security monitoring and reporting itweb workshop
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
What Are the Best Practices for IT Infrastructure Operations.pdf
Introduction to SABSA for BAs - Sac Valley IIBA 09.20.17 FINAL.pdf
HITRUST Certification
uses_and_benefits_of_framework based on NIST
ASSET INTEGRITY MANAGEMENT SYSTEM-BOOK.pptx
Cybersecurity Risk Management Program and Your Organization
IT Security Bachelor in information technology.pptx
Effective Strategies for Software Architecture Auditing
ESA for Business
Information Security Blueprint
Cissp classroom program ievision
Internal financial control - how ready are you - Webinar
Secure Software Development Models and Methods integrated with CMMI.ppt
Webinar | Asset Management Health Check
CISSP Training Program
Establishing the Core of an Effective Technology Risk Management Program
Ad

More from Maganathin Veeraragaloo (20)

PPTX
MULTI-CLOUD ARCHITECTURE
PPTX
Cloud security (domain11 14)
PPTX
Cloud security (domain6 10)
PPTX
Cloud Security (Domain1- 5)
PPTX
BTABOK / ITABOK
PPTX
PPTX
Foresight 4 Cybersecurity
PPTX
Cybersecurity Capability Maturity Model (C2M2)
PPTX
CLOUD NATIVE SECURITY
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PPTX
ISO 27005 - Digital Trust Framework
PPTX
ITIL4 - DIGITAL TRUST FRAMEWORK
PPTX
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
PPTX
COBIT 2019 - DIGITAL TRUST FRAMEWORK
PPTX
Open Digital Framework from TMFORUM
PPTX
Enterprise security architecture approach
PPTX
Cloud and Data Privacy
PPTX
PPTX
Multi cloud security architecture
PPTX
Multi Cloud Architecture Approach
MULTI-CLOUD ARCHITECTURE
Cloud security (domain11 14)
Cloud security (domain6 10)
Cloud Security (Domain1- 5)
BTABOK / ITABOK
Foresight 4 Cybersecurity
Cybersecurity Capability Maturity Model (C2M2)
CLOUD NATIVE SECURITY
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ISO 27005 - Digital Trust Framework
ITIL4 - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORK
Open Digital Framework from TMFORUM
Enterprise security architecture approach
Cloud and Data Privacy
Multi cloud security architecture
Multi Cloud Architecture Approach

SABSA Implementation(Part III)_ver1-0

  • 3. Scope: Strategy & Planning Phase - Process
  • 4. Alignment, Integration & Compliance Strategy • Understand what needs to be aligned, to what purpose, and where it is positioned within the SABSA framework • Business model or business process framework • Legislation, regulation or governance frameworks • Risk management methods, assurance framework or audit approach • IT Architecture framework or method • Controls framework, library or standard • Performance management & reporting framework • Etc.
  • 5. Strategy & Planning Phase Alignment
  • 10. Generic Defense in Depth Layering
  • 11. SABSA Defence-in-Depth Principles • No single point of failure • The architectural structure of the controls set improves security – The value of the whole is greater than the sum of the individual parts – Combinations of sensible measures in a collection of well designed control domains can deliver reasonable security • Without ‘rocket science’ • Without over-expenditure – The control domain structures themselves add value to overall security
  • 12. Multi-tiered Controls Strategy - Capabilities • Over-investment in preventative measures results in prevention of business and opportunity • SABSA multi-tiered control strategy provides assurance of security capabilities (in design or in review/audit): – Risk-proportional capability to Deter – Risk-proportional capability to Prevent – Risk-proportional capability to Contain – Risk-proportional capability to Detect – Risk-proportional capability to Track – Risk-proportional capability to Recover – Risk-proportional capability to Assure the other capabilities
  • 14. Application of Multi-tiered Controls In Risk • The multi-tiered controls strategy is modeled against the risk assessment to determine proportional and appropriate response • Contributes to selection of the right control in the right place at the right time • Enables further removal of subjectivity in selection of Risk Treatments • Facilitates construction of databases and risk management tools that respond to definitive risk scenarios with definitive control decisions • Increases speed and ease of use of Risk Assessment
  • 15. Application of SABSA Multi-tier Control
  • 16. Application of Multi-tiered Control Strategy
  • 17. END OF PART III