SlideShare a Scribd company logo
Adaptive Enterprise Security Architecture
John J. Czaplewski | Director of Professional Services | David Lynas Consulting, Ltd.
We build, deploy and operate …
Complex IT Systems
21 September 2016 David Lynas Consulting Ltd 2
Supported by …
Often
Not-So-Engineered Security
21 September 2016 David Lynas Consulting Ltd 3
Our technical security architectures focus on ...
Confidentiality, Integrity, Availability
and are becoming better and better
at adapting to dynamic threat environment
21 September 2016 David Lynas Consulting Ltd 4
But our Enterprises are concerned with much more:
21 September 2016 David Lynas Consulting Ltd 5
We need:
21 September 2016 David Lynas Consulting Ltd 6
a Framework and Methodology
for
Developing
Adaptive Enterprise Security Architectures
SABSA
21 September 2016 David Lynas Consulting Ltd 7
An internationally recognized methodology for:
• Developing risk-driven enterprise information security
and information assurance architectures
• Delivering security infrastructure solutions that support
and adapt to critical business initiatives.
SABSA
21 September 2016 David Lynas Consulting Ltd 8
• Begins with developing an understanding of key
enterprise business requirements,
• Transforms them into key business drivers for security
• Engineers the real business attributes that provide
the core supporting framework for an adaptive, living
enterprise security architecture
• Creates a chain of traceability from “Strategy &
Planning” through “Design’, “Implement” and
ongoing “Manage and Measure” to ensure that the
business mandate is preserved.
An Adaptive Enterprise Security Architecture
21 September 2016 David Lynas Consulting Ltd 9
Requires a comprehensive set of frameworks, models and methods
An Adaptive Enterprise Security Architecture:
Frames and Structures all Aspects of Enterprise Security
21 September 2016 David Lynas Consulting Ltd 10
An Adaptive Enterprise Security Architecture:
Manages all Aspects of Enterprise Security
21 September 2016 David Lynas Consulting Ltd 11
An Adaptive Enterprise Security Architecture:
Accountable Domain Authority
Develops Strategy and Plans
Sets Goals, Objectives & Expectations
Sets Performance Targets
Sets Risk Appetite
Sets Policy to Meet Objectives & Targets
Strategy & Planning Phase
Responsible Entities
Design Processes
Design Systems
Design Staffing Model
Design Controls & Enablers
Design
Establish Processes
Implement Systems
Appoint & Train People
Establish Controls & Enablers
Implement
Manage processes & operations
Manage people
Manage systems
Performance & Risk Monitoring
against KPIs and KRIs
Manage & Measure
Inform
of Responsibility
Report
Performance
& Compliance
With Target
Execute DesignTransition
Through-lifeAssurance
Higher Domain Authority
(Superdomain
Shareholders
Regulators)
Consult & Report Performance
Requires an Enterprise Security Architecture Governance Model
21 September 2016 David Lynas Consulting Ltd 12
An Adaptive Enterprise Security Architecture:
Defines Enterprise Security Architecture Capability Maturity Models
21 September 2016 David Lynas Consulting Ltd 13
Unreliable1
Informal2
Defined3
Monitored4
Optimised5
Assets
Motivation
Process
People
Location
Time
Contextual
Assets
Motivation
Process
People
Location
Time
Conceptual
Assets
Motivation
Process
People
Location
Time
Logical
Assets
Motivation
Process
People
Location
Time
Physical
Assets
Motivation
Process
People
Location
Time
Component
Assets
Motivation
Process
People
Location
Time
Service
Management
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
People
Time
Assets
Motivation
People
Time
Assets
Motivation
People
Time
Assets
Time
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
Location
ProcessProcess
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
People
Location
AssetsAssets
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
Time
Assets
Motivation
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
People
Location
Assets
People
Location
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
People
Location
Time
Assets
Motivation
Process
People
Time
Motivation
People
Time
People
Time
An Adaptive Enterprise Security Architecture:
Super Domain
Domain
A External
Impacted Domain
(customer)
Impacted
Peer Domain
C
Consult (C)
to define
policy &
target
C
C
Subdomain
External
Provider Domain
(service provider)
Inform (I)
policy &
target to
R domains
R
I
I
R
Inform (I*)
performance
to Super
&
Impacted
domains
I*
I*
I
Models Domain Roles and Responsibilities
21 September 2016 David Lynas Consulting Ltd 14
Risk Context
Assets
at Risk
Overall
likelihood
of loss
Likelihood of
threat
materialising
Likelihood of
weakness
exploited
Negative
Outcomes
Threats
Loss Event
Positive
Outcomes
Opportunities
Beneficial Event
Overall
loss
value
Asset
value
Negative
impact
value
Overall
benefit
value
Asset
value
Positive
impact
value
Overall
likelihood
of benefit
Likelihood of
opportunity
materialising
Likelihood of
strength
exploited
Analyses Threats and Opportunities
An Adaptive Enterprise Security Architecture:
21 September 2016 David Lynas Consulting Ltd 15
Understands and Communicates Technical Risk in Business Terms
An Adaptive Enterprise Security Architecture:
21 September 2016 David Lynas Consulting Ltd 16
An Adaptive Enterprise Security Architecture:
Creates Enterprise Policy Frameworks
Contextual Enterprise-wide Business Risk Policy
Conceptual
Policies for Enterprise-wide Risk & Opportunity Categories
Finance
Risk
Operational
Risk
Environment
Risk
Health &
Safety Risk
Information
Risk
Etc.
Logical
Policies for Logical
Domains
Policies for Logical
Domains
Policies for Logical
Domains
Physical
Procedures for Physical
Domains
Procedures for Physical
Domains
Procedures for Physical
Domains
Component
Standards for Nodes,
Addressed, Components
Standards for Nodes,
Addressed, Components
Standards for Nodes,
Addressed, Components
21 September 2016 David Lynas Consulting Ltd 17
David Lynas Consulting Ltd 18
An Adaptive Enterprise Security Architecture:
Business
Legislation
Process
Engineering
Methods
Business
Governance
Frameworks
Business
Sector
Regulation
Point of Primary
Integration for
any Standard
Requiring
measurable
Targets
Total Quality
Framework
Aligns and Integrates Business Requirements
21 September 2016
An Adaptive Enterprise Security Architecture:
Contextual: Meta-ProcessesVerticalSecurityConsistency
Horizontal Security Consistency
Conceptual: Strategic View of Process
Logical: Information Flows & Transformations
Physical: Data Flows & System Interactions
Component: Protocols
& Step Sequences
Delivers Top-Down, End-to-End Process Security
21 September 2016 David Lynas Consulting Ltd 19
An Adaptive Enterprise Security Architecture:
Derives Business-Linked Security Controls & Enablers
21 September 2016 David Lynas Consulting Ltd 20
An Adaptive Enterprise Security Architecture:
Builds Defence/Strength-in-Depth Control & Enablement Strategies
21 September 2016 David Lynas Consulting Ltd 21
David Lynas Consulting Ltd 22
An Adaptive Enterprise Security Architecture:
Technical
Controls
Management
Controls PCI
SOx
HIPAA
NIST
CobiT
ISO 27002
Integrates Controls Frameworks & Libraries
21 September 2016
David Lynas Consulting Ltd 23
An Adaptive Enterprise Security Architecture:
Develops Re-usable Operational Risk Management Architectures
Attributes
with performance targets & risk appetite thresholds
Risk Assessment
Ratings
Threat
Opportunity
Vulnerability
Strength
- Impact
+ Impact
Integrated Controls & Enablers Library – MTCS Modelled
Service 1
Mechanism 1
Component 1
Activity 1
Service 2
Mechanism 2
Component 2
Activity 2
Service 3
Mechanism 3
Component 3
Activity 3
21 September 2016
David Lynas Consulting Ltd 24
An Adaptive Enterprise Security Architecture:
Incorporates Business-Linked Risk Monitoring and Reporting Dashboards
21 September 2016
Risk Management
Attributes
Legal / Regulatory
Attributes
Access-controlled
Accountable
Assurable Enforceable
Compliant
Admissible
Business Attributes
Business Requirements
Business Drivers for Security
David Lynas Consulting Ltd 25
An Adaptive Enterprise Security Architecture:
Ensures the Enterprise Security Architecture Lives
21 September 2016
David Lynas Consulting Ltd 26
An Adaptive Enterprise Security Architecture:
• Security is about mitigating threats AND enabling
opportunities
• Change the security conversation to focus on
delivering value to the Enterprise
• Include security at the strategy and planning table
• Develop Enterprise Security Architecture that
enables the Enterprise to meet its mission, goals
and objectives
21 September 2016

More Related Content

PDF
Practical Enterprise Security Architecture
PPTX
Modelling Security Architecture
PDF
SABSA vs. TOGAF in a RMF NIST 800-30 context
PPTX
Security architecture frameworks
PPT
SABSA - Business Attributes Profiling
PDF
Security review using SABSA
PDF
Security-by-Design in Enterprise Architecture
PDF
SABSA white paper
Practical Enterprise Security Architecture
Modelling Security Architecture
SABSA vs. TOGAF in a RMF NIST 800-30 context
Security architecture frameworks
SABSA - Business Attributes Profiling
Security review using SABSA
Security-by-Design in Enterprise Architecture
SABSA white paper

What's hot (20)

PPTX
Enterprise Security Architecture
PDF
Enterprise Security Architecture
PPTX
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
PPTX
SABSA overview
PPTX
SABSA Implementation(Part V)_ver1-0
PPTX
SABSA Implementation(Part IV)_ver1-0
PPTX
SABSA Implementation(Part II)_ver1-0
PDF
Enterprise Security Architecture for Cyber Security
PPTX
SABSA Implementation(Part VI)_ver1-0
PPTX
SABSA Implementation(Part III)_ver1-0
PDF
Information Security Architecture: Building Security Into Your Organziation
PPTX
Conceptual security architecture
PPTX
Enterprise Security Architecture Design
PDF
Enterprise Security Architecture
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PDF
SABSA: Key features, advantages & benefits summary
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PDF
SOC Architecture - Building the NextGen SOC
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Enterprise Security Architecture
Enterprise Security Architecture
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
SABSA overview
SABSA Implementation(Part V)_ver1-0
SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part II)_ver1-0
Enterprise Security Architecture for Cyber Security
SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part III)_ver1-0
Information Security Architecture: Building Security Into Your Organziation
Conceptual security architecture
Enterprise Security Architecture Design
Enterprise Security Architecture
From SIEM to SOC: Crossing the Cybersecurity Chasm
SABSA: Key features, advantages & benefits summary
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
SOC Architecture - Building the NextGen SOC
Security operations center-SOC Presentation-مرکز عملیات امنیت
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Ad

Similar to Adaptive Enterprise Security Architecture (20)

PDF
Information security-integration-part-1-of-2
PDF
Enterprise%20 security%20architecture%20 %20business%20driven%20security
PPTX
ESA for Business
PPTX
Does Anyone Remember Enterprise Security Architecture?
PDF
EA_More_Than_Just_Standards
PPT
Security Incidents
PDF
Enterprise Information Security Architecture_Paper_1206
PPTX
Enterprise Architecture and Information Security
PDF
Enterprise Architecture - Information Security
PDF
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
PPTX
Business value of Enterprise Security Architecture
PDF
Security architecture
PPT
Ea Relationship To Security And The Enterprise V1
 
PDF
New technologies - Amer Haza'a
PPTX
Chapter 1 Security Framework
PPTX
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
PPTX
Enterprise under attack dealing with security threats and compliance
PDF
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
PDF
Doing Enterprise Architecture
PDF
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
Information security-integration-part-1-of-2
Enterprise%20 security%20architecture%20 %20business%20driven%20security
ESA for Business
Does Anyone Remember Enterprise Security Architecture?
EA_More_Than_Just_Standards
Security Incidents
Enterprise Information Security Architecture_Paper_1206
Enterprise Architecture and Information Security
Enterprise Architecture - Information Security
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Business value of Enterprise Security Architecture
Security architecture
Ea Relationship To Security And The Enterprise V1
 
New technologies - Amer Haza'a
Chapter 1 Security Framework
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Enterprise under attack dealing with security threats and compliance
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Doing Enterprise Architecture
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
Ad

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Spectroscopy.pptx food analysis technology
PDF
cuic standard and advanced reporting.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
1. Introduction to Computer Programming.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
Programs and apps: productivity, graphics, security and other tools
Spectroscopy.pptx food analysis technology
cuic standard and advanced reporting.pdf
Empathic Computing: Creating Shared Understanding
Network Security Unit 5.pdf for BCA BBA.
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Reach Out and Touch Someone: Haptics and Empathic Computing
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A comparative analysis of optical character recognition models for extracting...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Group 1 Presentation -Planning and Decision Making .pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
1. Introduction to Computer Programming.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)

Adaptive Enterprise Security Architecture

  • 1. Adaptive Enterprise Security Architecture John J. Czaplewski | Director of Professional Services | David Lynas Consulting, Ltd.
  • 2. We build, deploy and operate … Complex IT Systems 21 September 2016 David Lynas Consulting Ltd 2
  • 3. Supported by … Often Not-So-Engineered Security 21 September 2016 David Lynas Consulting Ltd 3
  • 4. Our technical security architectures focus on ... Confidentiality, Integrity, Availability and are becoming better and better at adapting to dynamic threat environment 21 September 2016 David Lynas Consulting Ltd 4
  • 5. But our Enterprises are concerned with much more: 21 September 2016 David Lynas Consulting Ltd 5
  • 6. We need: 21 September 2016 David Lynas Consulting Ltd 6 a Framework and Methodology for Developing Adaptive Enterprise Security Architectures
  • 7. SABSA 21 September 2016 David Lynas Consulting Ltd 7 An internationally recognized methodology for: • Developing risk-driven enterprise information security and information assurance architectures • Delivering security infrastructure solutions that support and adapt to critical business initiatives.
  • 8. SABSA 21 September 2016 David Lynas Consulting Ltd 8 • Begins with developing an understanding of key enterprise business requirements, • Transforms them into key business drivers for security • Engineers the real business attributes that provide the core supporting framework for an adaptive, living enterprise security architecture • Creates a chain of traceability from “Strategy & Planning” through “Design’, “Implement” and ongoing “Manage and Measure” to ensure that the business mandate is preserved.
  • 9. An Adaptive Enterprise Security Architecture 21 September 2016 David Lynas Consulting Ltd 9 Requires a comprehensive set of frameworks, models and methods
  • 10. An Adaptive Enterprise Security Architecture: Frames and Structures all Aspects of Enterprise Security 21 September 2016 David Lynas Consulting Ltd 10
  • 11. An Adaptive Enterprise Security Architecture: Manages all Aspects of Enterprise Security 21 September 2016 David Lynas Consulting Ltd 11
  • 12. An Adaptive Enterprise Security Architecture: Accountable Domain Authority Develops Strategy and Plans Sets Goals, Objectives & Expectations Sets Performance Targets Sets Risk Appetite Sets Policy to Meet Objectives & Targets Strategy & Planning Phase Responsible Entities Design Processes Design Systems Design Staffing Model Design Controls & Enablers Design Establish Processes Implement Systems Appoint & Train People Establish Controls & Enablers Implement Manage processes & operations Manage people Manage systems Performance & Risk Monitoring against KPIs and KRIs Manage & Measure Inform of Responsibility Report Performance & Compliance With Target Execute DesignTransition Through-lifeAssurance Higher Domain Authority (Superdomain Shareholders Regulators) Consult & Report Performance Requires an Enterprise Security Architecture Governance Model 21 September 2016 David Lynas Consulting Ltd 12
  • 13. An Adaptive Enterprise Security Architecture: Defines Enterprise Security Architecture Capability Maturity Models 21 September 2016 David Lynas Consulting Ltd 13 Unreliable1 Informal2 Defined3 Monitored4 Optimised5 Assets Motivation Process People Location Time Contextual Assets Motivation Process People Location Time Conceptual Assets Motivation Process People Location Time Logical Assets Motivation Process People Location Time Physical Assets Motivation Process People Location Time Component Assets Motivation Process People Location Time Service Management Assets Motivation Process People Location Time Assets Motivation Process People Time Assets Motivation People Time Assets Motivation People Time Assets Time Assets Motivation Process People Location Time Assets Motivation Process Location ProcessProcess Assets Motivation Process People Location Time Assets Motivation Process People Location AssetsAssets Assets Motivation Process People Location Time Assets Motivation Process People Location Time Assets Motivation Process People Location Time Assets Motivation Process Time Assets Motivation Assets Motivation Process People Location Time Assets Motivation Process People Location Assets People Location Assets Motivation Process People Location Time Assets Motivation Process People Location Time Assets Motivation Process People Time Motivation People Time People Time
  • 14. An Adaptive Enterprise Security Architecture: Super Domain Domain A External Impacted Domain (customer) Impacted Peer Domain C Consult (C) to define policy & target C C Subdomain External Provider Domain (service provider) Inform (I) policy & target to R domains R I I R Inform (I*) performance to Super & Impacted domains I* I* I Models Domain Roles and Responsibilities 21 September 2016 David Lynas Consulting Ltd 14
  • 15. Risk Context Assets at Risk Overall likelihood of loss Likelihood of threat materialising Likelihood of weakness exploited Negative Outcomes Threats Loss Event Positive Outcomes Opportunities Beneficial Event Overall loss value Asset value Negative impact value Overall benefit value Asset value Positive impact value Overall likelihood of benefit Likelihood of opportunity materialising Likelihood of strength exploited Analyses Threats and Opportunities An Adaptive Enterprise Security Architecture: 21 September 2016 David Lynas Consulting Ltd 15
  • 16. Understands and Communicates Technical Risk in Business Terms An Adaptive Enterprise Security Architecture: 21 September 2016 David Lynas Consulting Ltd 16
  • 17. An Adaptive Enterprise Security Architecture: Creates Enterprise Policy Frameworks Contextual Enterprise-wide Business Risk Policy Conceptual Policies for Enterprise-wide Risk & Opportunity Categories Finance Risk Operational Risk Environment Risk Health & Safety Risk Information Risk Etc. Logical Policies for Logical Domains Policies for Logical Domains Policies for Logical Domains Physical Procedures for Physical Domains Procedures for Physical Domains Procedures for Physical Domains Component Standards for Nodes, Addressed, Components Standards for Nodes, Addressed, Components Standards for Nodes, Addressed, Components 21 September 2016 David Lynas Consulting Ltd 17
  • 18. David Lynas Consulting Ltd 18 An Adaptive Enterprise Security Architecture: Business Legislation Process Engineering Methods Business Governance Frameworks Business Sector Regulation Point of Primary Integration for any Standard Requiring measurable Targets Total Quality Framework Aligns and Integrates Business Requirements 21 September 2016
  • 19. An Adaptive Enterprise Security Architecture: Contextual: Meta-ProcessesVerticalSecurityConsistency Horizontal Security Consistency Conceptual: Strategic View of Process Logical: Information Flows & Transformations Physical: Data Flows & System Interactions Component: Protocols & Step Sequences Delivers Top-Down, End-to-End Process Security 21 September 2016 David Lynas Consulting Ltd 19
  • 20. An Adaptive Enterprise Security Architecture: Derives Business-Linked Security Controls & Enablers 21 September 2016 David Lynas Consulting Ltd 20
  • 21. An Adaptive Enterprise Security Architecture: Builds Defence/Strength-in-Depth Control & Enablement Strategies 21 September 2016 David Lynas Consulting Ltd 21
  • 22. David Lynas Consulting Ltd 22 An Adaptive Enterprise Security Architecture: Technical Controls Management Controls PCI SOx HIPAA NIST CobiT ISO 27002 Integrates Controls Frameworks & Libraries 21 September 2016
  • 23. David Lynas Consulting Ltd 23 An Adaptive Enterprise Security Architecture: Develops Re-usable Operational Risk Management Architectures Attributes with performance targets & risk appetite thresholds Risk Assessment Ratings Threat Opportunity Vulnerability Strength - Impact + Impact Integrated Controls & Enablers Library – MTCS Modelled Service 1 Mechanism 1 Component 1 Activity 1 Service 2 Mechanism 2 Component 2 Activity 2 Service 3 Mechanism 3 Component 3 Activity 3 21 September 2016
  • 24. David Lynas Consulting Ltd 24 An Adaptive Enterprise Security Architecture: Incorporates Business-Linked Risk Monitoring and Reporting Dashboards 21 September 2016 Risk Management Attributes Legal / Regulatory Attributes Access-controlled Accountable Assurable Enforceable Compliant Admissible Business Attributes Business Requirements Business Drivers for Security
  • 25. David Lynas Consulting Ltd 25 An Adaptive Enterprise Security Architecture: Ensures the Enterprise Security Architecture Lives 21 September 2016
  • 26. David Lynas Consulting Ltd 26 An Adaptive Enterprise Security Architecture: • Security is about mitigating threats AND enabling opportunities • Change the security conversation to focus on delivering value to the Enterprise • Include security at the strategy and planning table • Develop Enterprise Security Architecture that enables the Enterprise to meet its mission, goals and objectives 21 September 2016