Top Banner
SACON SACON International 2017 India | Bangalore | November 10 – 11 | Hotel Lalit Ashok Enterprise Security Architecture
30

SACON - Enterprise Security Architecture (Bikash Barai)

Jan 21, 2018

Download

Technology

Priyanka Aash
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

SACONInternational2017India|Bangalore|November10– 11|HotelLalit Ashok

EnterpriseSecurityArchitecture

Page 2: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

EnterpriseArchitecture

• Afieldbornabout30yearsago• Initiallytargetedtoaddresstwoproblems• Systemcomplexity• Inadequatebusinessalignment• Resultinginto

• MoreCost,LessValue

Page 3: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

EnterpriseArchitecturalMethodologies• Consortia-developedFrameworks

• ISO19439• RM-ODP(ITU-TX.901-904)• TOGAF

• DefenseIndustryFramework• DoDAF• MODAF• NAF

• GovernmentFramework• ESAAF• FEAF• NISTEnterpriseArchitectureModel

• OpenSourceFrameworks• TRAK• SABSA

• ProprietaryFrameworks• Zachman Frameworks• IAF(Capgemini,1993)

Page 4: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

Zachman Framework(4)

Source:zachmaninternational.com

[ExecutiveMgmtPerspective]

[BusinessMgmtPerspective]

[Architect’sPerspective]

[Engineer’sPerspective]

[Technician’sPerspective]

Page 5: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

SABSA

Page 6: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

Challengeswithexistingmodels

• Tooheavytobeintimidating- Toomanysteps• Cannotbedoneincrementally– Needsbigbangapproach• VeryfewSABSAprofessionalsandveryfewimplementation• Doesnotproduceaprioritizedlistofsecurityactivities

Page 7: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

GoodnessCriteria

• Shouldhelptoeliminate• Shouldhelptofocus• Shouldbesimple• Shouldbeeasytoremember

Page 8: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

IntroducingCP-SSM

Page 9: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

GoalsofCP-SSM

• Light• Minimalist• Focused

Page 10: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

Steps

• CreateBusinessArchitecture(HighLevel)• StrategicThreatModeling• Elimination:BucketandPrune• Mapping:Threatsto4typesofcontrols• PriorityBucketingofActivities

Page 11: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

KeyElements

• CP- ThreatRepository• ThreatPrioritizationGuideline– Available• Benchmark,RiskManagementModel

• CP- ControlRepository– Notavailable• CP- ThreattoControlMap– Notavailable• CP- Activity/ControlPriorityMap

Page 12: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

ThreatRepository

• Taxonomy• Software(26subclass)• Hardware(3)• PhysicalSecurity(3)• SupplyChain(2)• Human(3)

• IndustryorverticalspecifictopNlisting

Page 13: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

CISOPlatformThreat– ControlMap

• Threat:SQLInjectionAttack• Detection:WAF,SAST,DAST,IAST,RASP• Prevention:SecureCoding,WAF,RASP• Response:SIEM,SOCResponseProcess• Prediction:TI(ExternalandInternal)

Page 14: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

PrioritizationMatrixPrevention Detection Response Prediction

HighRisk 1 1 2 3

MediumRisk

2 2 2 3

LowRisk 3 3 3 3

Page 15: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

NextSteps

• Utilizethemodel(loosely)forbuildinganAppsec Program- PostLunch• CreateCommunityProjects• ThreatRepository(Comprehensive+TopN)• ThreatControl

Page 16: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

SACONInternational2017India|Bangalore|November10– 11|HotelLalit Ashok

NISTCSF

Page 17: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

ObjectivesofCSFinaNutshell

DescribeCurrentSecurityPosture

DescribeTargetSecurityPosture

ContinuousImprovement

AssessProgresstowardsTargetPosture

CommunicateRisk

Page 18: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

FrameworkProfile(Whereyouareandwhereyou

wanttogo)

FrameworkImplementationTiers(How youviewcybersecurity)

FrameworkCore

(Whatitdoes)

•Defines(measures) currentstate•Defines(measures)desiredstate

•Tiers(4)thatshowhowcybersecurityrisksandprocessesareviewedwithinanorganization•RequiredTierbasedonperceivedrisk/benefitanalysis

•Identify•Protect•Detect•Restore•Recover

HighLeveloverviewoftheframework

Page 19: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

FrameworkCore

Identify

Detect

RespondRecover

Protect

TheFrameworkCore

Page 20: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

Structure

Microsoft Excel Worksheet

Page 21: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

FunctionUniqueIdentifier

Function Category UniqueIdentifier Category Subcategory Informative

References

ID Identify

ID.AM-1 AssetManagement

Physicaldeviceswithin the

organizationareinventoried

• CCS-CSC1• COBIT5• ISA-62443-2-

1:2009

ID.AM-2 AssetManagement

SoftwarePlatformsandApplicationswithintheorganization areinventoried

• CCS-CSC1• COBIT5• ISA-62443-2-

1:2009

Structuredexample

Page 22: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

FrameworkImplementationTiers

• Howcybersecurityrisksandprocessesareviewedwithinorganization

PartialRiskInformed

RepeatableAdaptable

Soph

istication

Page 23: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

Maturitylevels– BasedonNISTCSF

• Tier1– Partial• Cybersecurityriskmanagementpracticesarenotformalized,andriskismanagedinanadhocandsometimesreactivemanner.• Prioritizationofcybersecurityactivitiesmaynotbedirectlyinformedbyorganizationalriskobjectives,thethreatenvironment,or

business/missionrequirements.

• Tier2– RiskInformed• Riskmanagementpracticesareapprovedbymanagementbutmaynotbeestablishedasorganizational-widepolicy.• Prioritizationofcybersecurityactivitiesisdirectlyinformedbyorganizationalriskobjectives,thethreatenvironment,or business/mission

requirements.

• Tier3– Repeatable• Riskmanagementpracticesareformallyapprovedandexpressedaspolicy.Organizationalcybersecuritypracticesareregularly updated

basedontheapplicationofriskmanagementprocessestochangesinbusiness/missionrequirementsandachangingthreatandtechnologylandscape.

• Tier4– Adaptive• Adaptsitscybersecuritypracticesbasedonlessonslearnedandpredictiveindicatorsderivedfrompreviousandcurrentcybersecurity

activities.• Throughaprocessofcontinuousimprovementincorporatingadvancedcybersecuritytechnologiesandpractices,theorganization actively

adaptstoachangingcybersecuritylandscapeandrespondstoevolvingandsophisticatedthreatsinatimelymanner.

Private&Confidential

Page 24: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

Frameworkprofile• Presentsoverviewofpresentandfuturecybersecurityposture• BusinessRequirements• RiskTolerance• Resources

• Usedtodefinecurrentstateanddesiredstate• Canhelpmeasureprogress...

Page 25: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

CDMFramework

Private&Confidential

Source:CyberDefenseMatrix

Page 26: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

CDMMapping

Credit:Sounil Yu

Page 27: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

FireCompassScore(34/100)- SampleMaturitylevels

• Tier4:Adaptive

• Tier3:Repeatable

• Tier2:RiskInformed

• Tier1:Partial

Identify Protect Detect Respond Recover

Devices Tier2 Tier2 Tier2 Tier2 Tier1

Applications Tier2 Tier2 Tier1 Tier1 Tier1

Networks Tier1 Tier1 Tier1 Tier1 Tier1

Data Tier1 Tier2 Tier1 Tier1 Tier1

Users Tier1 Tier1 Tier1 Tier1 Tier1

Private&Confidential

Page 28: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

FireCompassScoresForIndianIndustry

Private&Confidential

8%

43%

45%

51%

52%

58%

61%

61%

Startups+FinTech

SmallBanks

Insurance

Manufacturing

IT/ITeS

FinancialServices

Telco

LargeBanks

Page 29: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

BeyondCorp

Page 30: SACON - Enterprise Security Architecture (Bikash Barai)

SACON

SACONInternational2017India|Bangalore|November10– 11|HotelLalit Ashok

Thankyou