SlideShare a Scribd company logo
5
Most read
6
Most read
7
Most read
SABSA Implementation
Generic Approach
PART II
POLICY ARCHITECTURE
SABSA Policy Domain Concepts
• A security domain is the set of entities (logical or physical) that are subject to a common
security policy
• The domain owner (most senior party vested with authority in the domain) sets the security
policy for the domain and is the Policy Authority
• The Policy Authority should be the clear owner of risk in the domain
• A security policy defines what is meant by security within a security domain (what security
services are required to what performance level)
• The policy also defines how the domain interacts with other domains
• The owner may delegate implementation of the security policy to a lower security authority
that acts on behalf of the domain owner
• The security policy is determined by the business requirements for information management
and information systems, following an assessment of the possible operational risks &
opportunities
• Security policy is a statement of business requirements for security, translated into a logical
structure that can be consistently applied, monitored and measured
• The security policy states what logical services are required but as far as possible avoids any
reference to particular physical mechanisms that will deliver the services
• Security policy documentation exists at a number of different levels, and hence it is useful to
conceive of a hierarchically layered security policy architecture
SABSA Policy Architecture Framework
• Layered policy architecture with each layer being derived from the
previous layer with traceability
• Enterprise-wide policy
– Contextual business-level risk management policy
– Conceptual abstraction of business policy in appropriate risk strategy
views
• Domain level policy
– Logical domain policy – security service requirements to manage risk
to domain
– Physical interpretation of policy – security practices and procedures
– Component interpretation of policy – detailed security standards and
rules
– Operational interpretation of policy – instructions to execute
procedure
Layered Policy Example
• Example: Backup Policy
• Policy Statement (Logical layer): In my domain all application
systems must use a backup service that backs-up full data weekly
with a daily incremental back-up on other days
• Procedure (Physical layer): This is how you configure the back up
Application ABC hosted on Platform PQR:
– N.B. The procedure itself is a security mechanism at the Physical
Security Architecture layer, but executing the procedure is an
operational activity
• Internal Standard (Component Layer): Back-up media must be of
minimum quality ‘x’ in accordance with ISO yyyyy and must be
retired after ‘z’ uses. Labelling and indexing standards are... etc.
• Execution Instruction (Security Service Management Layer): To
execute the back-up procedure for domain PQR, use service XYZ by
going to menu KLM and double-clicking the “backup” icon
The SABSA Policy Framework
SABSA Policy Framework – Risk
Strategy View
Inter-domain Policy Relationships
Inter-domain Policy Relationships
Vertical Domain Hierarchy – Risk Ownership &
Responsibility
• Each Policy Authority in the SABSA Policy Framework is responsible
for managing risks to their own domain-level assets, goals &
objectives
– They are unquestionably the primary subject matter expert
– They know more about risks to their domain than anyone else
– They have vested interest in their own critical success factors
– Therefore they issue and sign policy for their own domain
• However, they set that policy in the context of delivering to agreed
service levels with their super domain authority, thus their policy
must comply with, meet the needs of, and be authorised by, that
super domain authority
Multi-Dimensional Policy
• Domains (and therefore policies) of many types can exist in
multiple dimensions
– Logical community domains by business unit and/or geography
– Logical information domains by classification
– Physical infrastructure domains (technology layer domains)
SABSA Policy Framework – Domain Model
An enterprise domain model is constructed to deliver all concepts in this section
END OF PART II

More Related Content

PPTX
SABSA Implementation(Part III)_ver1-0
PPTX
SABSA Implementation(Part I)_ver1-0
PPTX
SABSA overview
PDF
SABSA vs. TOGAF in a RMF NIST 800-30 context
PPTX
Enterprise Security Architecture
PPTX
SABSA Implementation(Part VI)_ver1-0
PDF
Enterprise Security Architecture
PPTX
SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part III)_ver1-0
SABSA Implementation(Part I)_ver1-0
SABSA overview
SABSA vs. TOGAF in a RMF NIST 800-30 context
Enterprise Security Architecture
SABSA Implementation(Part VI)_ver1-0
Enterprise Security Architecture
SABSA Implementation(Part IV)_ver1-0

What's hot (20)

PPTX
Modelling Security Architecture
PDF
Security review using SABSA
PPTX
SABSA Implementation(Part V)_ver1-0
PPT
SABSA - Business Attributes Profiling
PPTX
Enterprise Security Architecture Design
PDF
SABSA white paper
PDF
Practical Enterprise Security Architecture
PPTX
Adaptive Enterprise Security Architecture
PPTX
Security architecture frameworks
PPTX
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
PDF
Enterprise Security Architecture
PDF
SABSA: Key features, advantages & benefits summary
PDF
Enterprise Security Architecture for Cyber Security
PPTX
Conceptual security architecture
PDF
Information Security Architecture: Building Security Into Your Organziation
PDF
Security-by-Design in Enterprise Architecture
PDF
Cyber Security Maturity Assessment
PDF
TOGAF 9 - Security Architecture Ver1 0
PDF
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
PDF
Enterprise Security Architecture: From access to audit
Modelling Security Architecture
Security review using SABSA
SABSA Implementation(Part V)_ver1-0
SABSA - Business Attributes Profiling
Enterprise Security Architecture Design
SABSA white paper
Practical Enterprise Security Architecture
Adaptive Enterprise Security Architecture
Security architecture frameworks
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
Enterprise Security Architecture
SABSA: Key features, advantages & benefits summary
Enterprise Security Architecture for Cyber Security
Conceptual security architecture
Information Security Architecture: Building Security Into Your Organziation
Security-by-Design in Enterprise Architecture
Cyber Security Maturity Assessment
TOGAF 9 - Security Architecture Ver1 0
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Enterprise Security Architecture: From access to audit
Ad

Similar to SABSA Implementation(Part II)_ver1-0 (20)

PPTX
I am sharing 'Unit-2' with youuuuuu.PPTX
PPT
Security issue in cloud by himanshu tiwari
PPT
Anya-Kim-Bhargava-MCCWorkshoooo p (1).ppt
PPT
Anya-Kim-Bhargava-MCCWorkshop.ppt
PPTX
Secure Cloud Issues
PPTX
Information Security Blueprint
PPTX
Cloud computing & security basics
PDF
Secure Cloud Hosting: Real Requirements to Protect your Data
PPTX
Introduction to the CSA Cloud Controls Matrix
PPTX
Transforming cloud security into an advantage
PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
PPTX
Infosec policies to appsec standards ed final
PDF
AFAC session 2 - September 8, 2014
PPTX
NARA's FAQ and Bulletin on Cloud Computing
PPT
SLVA - Security monitoring and reporting itweb workshop
PDF
Cloud Migration Strategies Transitioning to a Community Cloud.pdf
PPTX
Cloud computing
PDF
CISSP - Certified Information Systems Security Professional
PPTX
Cloud bursting methodology
I am sharing 'Unit-2' with youuuuuu.PPTX
Security issue in cloud by himanshu tiwari
Anya-Kim-Bhargava-MCCWorkshoooo p (1).ppt
Anya-Kim-Bhargava-MCCWorkshop.ppt
Secure Cloud Issues
Information Security Blueprint
Cloud computing & security basics
Secure Cloud Hosting: Real Requirements to Protect your Data
Introduction to the CSA Cloud Controls Matrix
Transforming cloud security into an advantage
I am sharing 'unit 4' with youuuuuu.PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
Infosec policies to appsec standards ed final
AFAC session 2 - September 8, 2014
NARA's FAQ and Bulletin on Cloud Computing
SLVA - Security monitoring and reporting itweb workshop
Cloud Migration Strategies Transitioning to a Community Cloud.pdf
Cloud computing
CISSP - Certified Information Systems Security Professional
Cloud bursting methodology
Ad

More from Maganathin Veeraragaloo (20)

PPTX
MULTI-CLOUD ARCHITECTURE
PPTX
Cloud security (domain11 14)
PPTX
Cloud security (domain6 10)
PPTX
Cloud Security (Domain1- 5)
PPTX
BTABOK / ITABOK
PPTX
PPTX
Foresight 4 Cybersecurity
PPTX
Cybersecurity Capability Maturity Model (C2M2)
PPTX
CLOUD NATIVE SECURITY
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PPTX
ISO 27005 - Digital Trust Framework
PPTX
ITIL4 - DIGITAL TRUST FRAMEWORK
PPTX
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
PPTX
COBIT 2019 - DIGITAL TRUST FRAMEWORK
PPTX
Open Digital Framework from TMFORUM
PPTX
Enterprise security architecture approach
PPTX
Cloud and Data Privacy
PPTX
PPTX
Multi cloud security architecture
PPTX
Multi Cloud Architecture Approach
MULTI-CLOUD ARCHITECTURE
Cloud security (domain11 14)
Cloud security (domain6 10)
Cloud Security (Domain1- 5)
BTABOK / ITABOK
Foresight 4 Cybersecurity
Cybersecurity Capability Maturity Model (C2M2)
CLOUD NATIVE SECURITY
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ISO 27005 - Digital Trust Framework
ITIL4 - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORK
Open Digital Framework from TMFORUM
Enterprise security architecture approach
Cloud and Data Privacy
Multi cloud security architecture
Multi Cloud Architecture Approach

SABSA Implementation(Part II)_ver1-0

  • 3. SABSA Policy Domain Concepts • A security domain is the set of entities (logical or physical) that are subject to a common security policy • The domain owner (most senior party vested with authority in the domain) sets the security policy for the domain and is the Policy Authority • The Policy Authority should be the clear owner of risk in the domain • A security policy defines what is meant by security within a security domain (what security services are required to what performance level) • The policy also defines how the domain interacts with other domains • The owner may delegate implementation of the security policy to a lower security authority that acts on behalf of the domain owner • The security policy is determined by the business requirements for information management and information systems, following an assessment of the possible operational risks & opportunities • Security policy is a statement of business requirements for security, translated into a logical structure that can be consistently applied, monitored and measured • The security policy states what logical services are required but as far as possible avoids any reference to particular physical mechanisms that will deliver the services • Security policy documentation exists at a number of different levels, and hence it is useful to conceive of a hierarchically layered security policy architecture
  • 4. SABSA Policy Architecture Framework • Layered policy architecture with each layer being derived from the previous layer with traceability • Enterprise-wide policy – Contextual business-level risk management policy – Conceptual abstraction of business policy in appropriate risk strategy views • Domain level policy – Logical domain policy – security service requirements to manage risk to domain – Physical interpretation of policy – security practices and procedures – Component interpretation of policy – detailed security standards and rules – Operational interpretation of policy – instructions to execute procedure
  • 5. Layered Policy Example • Example: Backup Policy • Policy Statement (Logical layer): In my domain all application systems must use a backup service that backs-up full data weekly with a daily incremental back-up on other days • Procedure (Physical layer): This is how you configure the back up Application ABC hosted on Platform PQR: – N.B. The procedure itself is a security mechanism at the Physical Security Architecture layer, but executing the procedure is an operational activity • Internal Standard (Component Layer): Back-up media must be of minimum quality ‘x’ in accordance with ISO yyyyy and must be retired after ‘z’ uses. Labelling and indexing standards are... etc. • Execution Instruction (Security Service Management Layer): To execute the back-up procedure for domain PQR, use service XYZ by going to menu KLM and double-clicking the “backup” icon
  • 6. The SABSA Policy Framework
  • 7. SABSA Policy Framework – Risk Strategy View
  • 9. Inter-domain Policy Relationships Vertical Domain Hierarchy – Risk Ownership & Responsibility • Each Policy Authority in the SABSA Policy Framework is responsible for managing risks to their own domain-level assets, goals & objectives – They are unquestionably the primary subject matter expert – They know more about risks to their domain than anyone else – They have vested interest in their own critical success factors – Therefore they issue and sign policy for their own domain • However, they set that policy in the context of delivering to agreed service levels with their super domain authority, thus their policy must comply with, meet the needs of, and be authorised by, that super domain authority
  • 10. Multi-Dimensional Policy • Domains (and therefore policies) of many types can exist in multiple dimensions – Logical community domains by business unit and/or geography – Logical information domains by classification – Physical infrastructure domains (technology layer domains)
  • 11. SABSA Policy Framework – Domain Model An enterprise domain model is constructed to deliver all concepts in this section