SlideShare a Scribd company logo
5
Most read
7
Most read
18
Most read
Security Architecture
Agenda 
Frameworks and Standards 
 Different ways of looking at Risk 
 Impact 
Assurance
O Desafio está aumentando... 
120% 
100% 
80% 
60% 
40% 
20% 
0% 
PERCENTAGE OF IT BUDGET 
DEVOTED TO SECURITY 
Percentage of IT budget devoted to security 
1990 Today 2040
Security and Architecture 
IT Architecture is about using IT to meet business needs 
Security is about reducing business risk 
Security Architecture is about reducing business risk from IT
Security Architecture Frameworks and Standards 
TOGAF 
Next 
Everything 
TOGAF 9 
Process, Content 
TOGAF 8 
Process Only 
IAF 
Content Only 
SABSA 
Security Specific 
Zachman 
Content Only 
FAIR 
Risk Analysis
Security Measures vs. Risks 
Threat 
Uses 
Access Path 
To perform 
Asset 
Impact 
Deterrence 
Prevention 
Detection 
Containment 
Attack 
Against 
Which results in 
Recovery 
Risk 
Security Measures 
Deters 
Controls 
Detects 
Recovers 
Limits
Security Concepts in an Architecture Framework 
Context: 
Why do I need to be Secure? 
Concept: 
What security do I need? 
Logical/Physical: 
How will I be secure? 
Threats Stakeholders Drivers 
Assets Domains 
Access Routes 
Risks 
Requirements Policies 
Services Measures
Different Types of Risk 
Domains 
Assets 
Threats 
• Risks are unexpected or uncertain 
events 
• Risks trigger impacts if they occur 
• Real-world systems have many 
risks 
• Security measures mitigate the 
risks 
• The cost of a security measure 
must be less than the value of the 
risks it mitigates
Asset Risk 
Assets are things the business values 
 Stakeholders are people and organisations 
that have an interest in assets 
 Stakeholders have objectives - things they 
want to enforce - laws, contracts, ethical rules, 
principles, policies 
 Confidentiality, Integrity, Availability, Non-repudiation 
 Stakeholders can be negative 
 For every asset/objective combination, there is 
a risk this will not be enforced 
Looking at risk in this way helps you to 
concentrate on what is of value 
Domains 
Assets 
Threats
Threat Risk 
 Threat Agents are people, organisations or 
events with access to your assets 
 Threat agents can be legitimate 
 Employees, Customers 
 or illegitimate 
 Hackers, criminals 
 Or unexpected events 
 Component failure, flood, earthquake 
 Threat agents can make mistakes, or can 
deliberately attack you, or can happen 
unexpectedly 
 This leads to an objective not being met 
Looking at risk in this way helps you to 
concentrate on possible loss scenarios 
Domains 
Assets 
Threats
Domain Risk 
Domains are the places where assets are 
stored: 
 Networks, servers, processes, databases, files, sites, 
boxes 
Domains are accessed by threat agents via 
access routes 
Access routes need to be secured 
 Guided by common sense and good practice 
Non-secured access routes are a source of 
risk 
Looking at risk in this way helps you to 
concentrate on how an attacker would get in 
Domains 
Assets 
Threats
Anatomy of an Attack 
Threat Agent Stakeholders 
Actions By Threat Agent 
Actions by 
Stakeholders 
Legitimate Access - Event Illegitimate Access 
- Impact 
Security Breach Occurs 
Asset 
Breach Detected 
and Stopped 
Timeline
Impact
Security measures are justified by risks but… 
Risks are difficult to 
enumerate systematically 
The impact of a risk is difficult 
to estimate 
Real systems generate 
enormous numbers of risks 
 It’s not practical to design 
security countermeasures as 
responses to risks 
Most security practitioners 
don’t start with a list of risks 
Instead, they start with good 
practice and common sense 
And only list risks when a 
business case is needed
Assurance 
 How do I know I’m secure? 
Testing 
Penetration Testing 
Evaluation (Vs ISO 15408) 
Risk Analysis 
Maturity Modelling 
Certification (Vs ISO 27001)
Security Architecture Service Delivery Framework 
ROLES 
Security Advisor 
Security 
Engagement Manager 
Security Architect 
Security Auditor 
CAPGEMINI PROCESSES ARTEFACTS 
Advisory 
Work Initiation 
Example Security Policies, Standards 
Sizing Tools 
Request Templates 
Reporting 
Resource Management 
Industrialised Design 
Quality Assurance 
Governance 
Added Value 
Report Templates 
Architecture Design Templates 
Waiver & Exemption Templates 
Risk Assessment Tools 
Detailed Design 
Virtualised Platform Pattern 
Mobile Devices Pattern 
Cloud Architecture Pattern 
IAM Architecture Pattern 
Etc. 
New Starter Pack 
Value IT Tools 
Controls Review 
Etc. 
New Project 
Project: 
Security 
Initiation 
Architecture 
Design 
Security 
Review 
Detailed 
Design & Build 
DELIVERABLES 
• Project Initiation 
• Information Classification 
• Risk Assessment 
• Business Impact Assessment 
• Security Architecture Resource 
Request 
• Requirements Definition 
• Outline Solution Design 
• Full Solution Design 
• Waivers & Exemptions 
• Controls Review 
• Detailed Design 
Security Designer
Conclusion: What makes up a security architecture 
Threat 
Agents 
Security 
Architecture 
Access 
Routes 
Domains 
Assets 
Stakeholders 
Objectives 
Risks 
Measures 
Impacts
www.capgemini.com 
The information contained in this presentation is proprietary. 
© 2013 Capgemini. All rights reserved. 
About Capgemini 
With more than 130,000 people in 44 countries, Capgemini is one 
of the world's foremost providers of consulting, technology and 
outsourcing services. The Group reported 2013 global revenues 
of EUR 10.1 billion. Together with its clients, Capgemini creates 
and delivers business and technology solutions that fit their needs 
and drive the results they want. A deeply multicultural 
organization, Capgemini has developed its own way of working, 
the Collaborative Business ExperienceTM, and draws on 
Rightshore®, its worldwide delivery model. 
Learn more about us at www.capgemini.com. 
Rightshore® is a trademark belonging to Capgemini

More Related Content

PDF
Security-by-Design in Enterprise Architecture
PDF
Enterprise Security Architecture for Cyber Security
PDF
TOGAF 9 - Security Architecture Ver1 0
PDF
Security architecture
PDF
Practical Enterprise Security Architecture
PDF
Enterprise Security Architecture
PDF
SABSA vs. TOGAF in a RMF NIST 800-30 context
PPTX
Adaptive Enterprise Security Architecture
Security-by-Design in Enterprise Architecture
Enterprise Security Architecture for Cyber Security
TOGAF 9 - Security Architecture Ver1 0
Security architecture
Practical Enterprise Security Architecture
Enterprise Security Architecture
SABSA vs. TOGAF in a RMF NIST 800-30 context
Adaptive Enterprise Security Architecture

What's hot (20)

PPTX
Effective Security Operation Center - present by Reza Adineh
PDF
Building a Next-Generation Security Operations Center (SOC)
PPTX
Modelling Security Architecture
PPTX
Enterprise Security Architecture
PPTX
Enterprise Security Architecture Design
PDF
Enterprise Security Architecture
PDF
DTS Solution - Building a SOC (Security Operations Center)
PPTX
SABSA overview
PDF
Building Security Operation Center
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PDF
Security review using SABSA
PPTX
An introduction to SOC (Security Operation Center)
PDF
Cybersecurity Roadmap Development for Executives
PPTX
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
PDF
Building a Security Architecture
PDF
When and How to Set up a Security Operations Center
PPTX
SABSA Implementation(Part II)_ver1-0
PPTX
SABSA Implementation(Part III)_ver1-0
PDF
Rothke secure360 building a security operations center (soc)
PPTX
Rothke rsa 2012 building a security operations center (soc)
Effective Security Operation Center - present by Reza Adineh
Building a Next-Generation Security Operations Center (SOC)
Modelling Security Architecture
Enterprise Security Architecture
Enterprise Security Architecture Design
Enterprise Security Architecture
DTS Solution - Building a SOC (Security Operations Center)
SABSA overview
Building Security Operation Center
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security review using SABSA
An introduction to SOC (Security Operation Center)
Cybersecurity Roadmap Development for Executives
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
Building a Security Architecture
When and How to Set up a Security Operations Center
SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part III)_ver1-0
Rothke secure360 building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ad

Viewers also liked (6)

PPTX
Cybersecurity Metrics: Reporting to BoD
PPTX
Scott Hogg - Gtri cloud security knowledge and certs
PDF
It governance & cobit 5
PPTX
NIST CyberSecurity Framework: An Overview
PDF
What is IT Governance?
PPTX
Governance and Management of Enterprise IT with COBIT 5 Framework
Cybersecurity Metrics: Reporting to BoD
Scott Hogg - Gtri cloud security knowledge and certs
It governance & cobit 5
NIST CyberSecurity Framework: An Overview
What is IT Governance?
Governance and Management of Enterprise IT with COBIT 5 Framework
Ad

Similar to Security architecture frameworks (20)

PPTX
Does Anyone Remember Enterprise Security Architecture?
PPTX
Conceptual security architecture
PPTX
Vulenerability Management.pptx
PPTX
ESA for Business
PPT
Security_Updates_cybersecuirty ppt presentation.ppt
PDF
CCA study group
PPTX
Top Cybersecurity Challenges Facing Your Business
PPT
Risk Assessment And Management
PPTX
MIS: Information Security Management
PDF
Security Shift Leftmost - Secure Architecture.pdf
PDF
Application Threat Modeling In Risk Management
PPTX
Cyber Security # Lec 3
PPT
Security Overview - Updates and Trends In Detail
PPTX
Security Incident machnism Security Incident machnismSecurity Incident machni...
PPTX
The Evolution of Cybercrime
PPTX
Security architecture, engineering and operations
PPTX
Threat modelling(system + enterprise)
PPTX
crisc_wk_5.pptx
PPT
Software Security in the Real World
PPTX
Administering security
Does Anyone Remember Enterprise Security Architecture?
Conceptual security architecture
Vulenerability Management.pptx
ESA for Business
Security_Updates_cybersecuirty ppt presentation.ppt
CCA study group
Top Cybersecurity Challenges Facing Your Business
Risk Assessment And Management
MIS: Information Security Management
Security Shift Leftmost - Secure Architecture.pdf
Application Threat Modeling In Risk Management
Cyber Security # Lec 3
Security Overview - Updates and Trends In Detail
Security Incident machnism Security Incident machnismSecurity Incident machni...
The Evolution of Cybercrime
Security architecture, engineering and operations
Threat modelling(system + enterprise)
crisc_wk_5.pptx
Software Security in the Real World
Administering security

Recently uploaded (20)

PPT
tcp ip networks nd ip layering assotred slides
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
innovation process that make everything different.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Internet___Basics___Styled_ presentation
tcp ip networks nd ip layering assotred slides
Module 1 - Cyber Law and Ethics 101.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
innovation process that make everything different.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Unit-1 introduction to cyber security discuss about how to secure a system
PptxGenJS_Demo_Chart_20250317130215833.pptx
The Internet -By the Numbers, Sri Lanka Edition
RPKI Status Update, presented by Makito Lay at IDNOG 10
WebRTC in SignalWire - troubleshooting media negotiation
Slides PDF The World Game (s) Eco Economic Epochs.pdf
522797556-Unit-2-Temperature-measurement-1-1.pptx
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Cloud-Scale Log Monitoring _ Datadog.pdf
Design_with_Watersergyerge45hrbgre4top (1).ppt
Paper PDF World Game (s) Great Redesign.pdf
Internet___Basics___Styled_ presentation

Security architecture frameworks

  • 2. Agenda Frameworks and Standards  Different ways of looking at Risk  Impact Assurance
  • 3. O Desafio está aumentando... 120% 100% 80% 60% 40% 20% 0% PERCENTAGE OF IT BUDGET DEVOTED TO SECURITY Percentage of IT budget devoted to security 1990 Today 2040
  • 4. Security and Architecture IT Architecture is about using IT to meet business needs Security is about reducing business risk Security Architecture is about reducing business risk from IT
  • 5. Security Architecture Frameworks and Standards TOGAF Next Everything TOGAF 9 Process, Content TOGAF 8 Process Only IAF Content Only SABSA Security Specific Zachman Content Only FAIR Risk Analysis
  • 6. Security Measures vs. Risks Threat Uses Access Path To perform Asset Impact Deterrence Prevention Detection Containment Attack Against Which results in Recovery Risk Security Measures Deters Controls Detects Recovers Limits
  • 7. Security Concepts in an Architecture Framework Context: Why do I need to be Secure? Concept: What security do I need? Logical/Physical: How will I be secure? Threats Stakeholders Drivers Assets Domains Access Routes Risks Requirements Policies Services Measures
  • 8. Different Types of Risk Domains Assets Threats • Risks are unexpected or uncertain events • Risks trigger impacts if they occur • Real-world systems have many risks • Security measures mitigate the risks • The cost of a security measure must be less than the value of the risks it mitigates
  • 9. Asset Risk Assets are things the business values  Stakeholders are people and organisations that have an interest in assets  Stakeholders have objectives - things they want to enforce - laws, contracts, ethical rules, principles, policies  Confidentiality, Integrity, Availability, Non-repudiation  Stakeholders can be negative  For every asset/objective combination, there is a risk this will not be enforced Looking at risk in this way helps you to concentrate on what is of value Domains Assets Threats
  • 10. Threat Risk  Threat Agents are people, organisations or events with access to your assets  Threat agents can be legitimate  Employees, Customers  or illegitimate  Hackers, criminals  Or unexpected events  Component failure, flood, earthquake  Threat agents can make mistakes, or can deliberately attack you, or can happen unexpectedly  This leads to an objective not being met Looking at risk in this way helps you to concentrate on possible loss scenarios Domains Assets Threats
  • 11. Domain Risk Domains are the places where assets are stored:  Networks, servers, processes, databases, files, sites, boxes Domains are accessed by threat agents via access routes Access routes need to be secured  Guided by common sense and good practice Non-secured access routes are a source of risk Looking at risk in this way helps you to concentrate on how an attacker would get in Domains Assets Threats
  • 12. Anatomy of an Attack Threat Agent Stakeholders Actions By Threat Agent Actions by Stakeholders Legitimate Access - Event Illegitimate Access - Impact Security Breach Occurs Asset Breach Detected and Stopped Timeline
  • 14. Security measures are justified by risks but… Risks are difficult to enumerate systematically The impact of a risk is difficult to estimate Real systems generate enormous numbers of risks  It’s not practical to design security countermeasures as responses to risks Most security practitioners don’t start with a list of risks Instead, they start with good practice and common sense And only list risks when a business case is needed
  • 15. Assurance  How do I know I’m secure? Testing Penetration Testing Evaluation (Vs ISO 15408) Risk Analysis Maturity Modelling Certification (Vs ISO 27001)
  • 16. Security Architecture Service Delivery Framework ROLES Security Advisor Security Engagement Manager Security Architect Security Auditor CAPGEMINI PROCESSES ARTEFACTS Advisory Work Initiation Example Security Policies, Standards Sizing Tools Request Templates Reporting Resource Management Industrialised Design Quality Assurance Governance Added Value Report Templates Architecture Design Templates Waiver & Exemption Templates Risk Assessment Tools Detailed Design Virtualised Platform Pattern Mobile Devices Pattern Cloud Architecture Pattern IAM Architecture Pattern Etc. New Starter Pack Value IT Tools Controls Review Etc. New Project Project: Security Initiation Architecture Design Security Review Detailed Design & Build DELIVERABLES • Project Initiation • Information Classification • Risk Assessment • Business Impact Assessment • Security Architecture Resource Request • Requirements Definition • Outline Solution Design • Full Solution Design • Waivers & Exemptions • Controls Review • Detailed Design Security Designer
  • 17. Conclusion: What makes up a security architecture Threat Agents Security Architecture Access Routes Domains Assets Stakeholders Objectives Risks Measures Impacts
  • 18. www.capgemini.com The information contained in this presentation is proprietary. © 2013 Capgemini. All rights reserved. About Capgemini With more than 130,000 people in 44 countries, Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. The Group reported 2013 global revenues of EUR 10.1 billion. Together with its clients, Capgemini creates and delivers business and technology solutions that fit their needs and drive the results they want. A deeply multicultural organization, Capgemini has developed its own way of working, the Collaborative Business ExperienceTM, and draws on Rightshore®, its worldwide delivery model. Learn more about us at www.capgemini.com. Rightshore® is a trademark belonging to Capgemini

Editor's Notes

  • #17: To enable this, we are in the processes of defining what we are calling a security architecture delivery framework To be clear – this is not about reinventing TOGAF or IAF. This is about using those best practices, and creating: On the right hand side there – a whole toolkit of templates, patterns and other artifacts that can be reused across different accounts It’s about having processes defined about how we provide these services. These processes are not just how one individual architect works, it is the whole set of surrounding processes about how to engage and assure and report on the architecture services we provide And finally it is about our people, making sure we have clear roles and responsibilities, and people working effectively as part of a team, equipped with the knowledge and the tools they need to do their job effectively It is a lot of work and a major Capgemini investment to create something like this, but we have a core framework in place already, and are now extending the artifacts within the framework on an ongoing (daily) basis. This is here and now, now future stuff. It is simply industrialising and exploiting our strong track record in security architecture delivery.