The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ......

35
The South African EA Forum Twitter: @EAforumSA #ogza Follow the EA Forum on Twitter… http://opengroup.co.za/ea-forum Our upcoming events The EA Forum is a networking event sponsored by The Open Group in South Africa. It started in 2004 and is hosted every second month or so, with events in Durban, Johannesburg and Cape Town. At the EA Forum, industry leaders share their experiences and knowledge of architecture and related topics. Real-world case studies highlight how business problems are solved using the discipline and practice of architecture. The event is also an opportunity for the architecture community members to network and collaborate. For more information or to submit your presentation topics please contact Stuart Macgregor Subscribe to our EA FORUM DATABASE

Transcript of The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ......

Page 1: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

The South African EA Forum

Twitter: @EAforumSA

#ogza

Follow the EA Forum

on Twitter…

http://opengroup.co.za/ea-forum

Our upcoming

events

The EA Forum is a networking event sponsored by The Open Group in South

Africa. It started in 2004 and is hosted every second month or so, with events

in Durban, Johannesburg and Cape Town. At the EA Forum, industry leaders

share their experiences and knowledge of architecture and related topics.

Real-world case studies highlight how business problems are solved using the

discipline and practice of architecture. The event is also an opportunity for the

architecture community members to network and collaborate.

For more information or to submit your presentation topics please contact

Stuart Macgregor

Subscribe to our EA FORUM DATABASE

Page 2: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Leading the development of open, vendor-neutral IT standardsand certifications

http://opengroup.co.za

http://opengroup.org/

Page 3: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security
Page 4: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Security-by-Design in Enterprise Architecture

Prof. Dr. Ernest Ketcha Ngassam / Ngoie Wandelewe / Frans Sauermann

The strategic importance of Information Security for organisations is gaining momentum. The current surge in cyber threats iscompelling organisations to invest in information security to protect their assets. Rushing to protect assets often comes with theexpense of excessive technology adoption without a valid strategic foundation. Enterprise Security Architecture is geared toaddress these issues, but is frequently misaligned with Enterprise Architecture.

At this month’s EA Forum, we will explore avenues for the adoption and enforcement of Security-By-Design in the EnterpriseArchitecture value-chain so as position Risk, Security and IT as true business enablers.

Prof. Dr. Ernest Ketcha Ngassam is the General Manager: Information Security Architecture and Technical Excellence at MTN Group. He is also ProfessorExtraordinaire of Computer Science at the School of Computing, UNISA, and holds a PhD in Computer Science from the University of Pretoria.

Ngoie Wandelewe is the Solutions/Enterprise Architect - Strategy & Business Development where he designed the Technology and Strategy Road map.He is reviewing current system security measures and recommending and implementing enhancements to the Architectural design to be used across 22countries

Frans Sauermann is the Senior Manager: Information Systems Security Architecture at MTN Group. He holds 25 certifications related to informationsecurity architecture from The Open Group, SABSA, ISACA, ISC^2, AXELOS, PMI, Cloud security alliance and others. He has over 14 years of experience ininformation security, 10 of which were spent with MTN.

Page 5: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

What we will be going through

Day 2

• Introduction

o Enterprise Architecture

o Enterprise Security Architecture

o Security by Design

o Stakeholder (CIO, CISO)

• Problem Statement

o EA Limitation

o ESA Limitation

o Stakeholder Conflict

• Security By Design – ESA

o EA, ESA, SRA & SSA

o EA Metamodel & Practice

o End goal of ESA & Practice

• Conclusion

1

2

3

4

Pick one:

A. Do whole talk first then questions

B. Questions while on discussion point

C. Jump between discussion points

until time runs out

D. Corner me after the talk

By all means, differing opinions and

backgrounds make us learn from each

other

Page 6: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Enterprise Architecture (EA)

Enterprise Security Architecture (ESA)

Security by Design (SbD)

Page 7: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Introducing EA,ESA, SbD - Definition

▪ Formal and structured way of viewing

and defining enterprise

▪ Aligns business vision with IT

▪ Builds transformative capabilities from

people, processes, technology, and

information

Enterprise Architecture (EA)

▪ Provides guidelines as services, models

and standards to achieve the overall

enterprise security strategy

▪ Translates business vision and strategy

into effective enterprise security

Enterprise Security Architecture (ESA)

1

OpenFAIR

Page 8: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

1 Introducing EA,ESA, SbD - Definition

▪ Formalize infrastructure design and automate security controls to

enable building security into every part of IT

▪ Improving capability to develop secure products

▪ Enabling security capabilities - instead of auditing security into a system

▪ Includes build and operations phases

Security by Design (SbD)

Page 9: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Problem Statement

Page 10: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

CIO & CISO Conflicting Goals?

CISO

▪ Information systems and digital management focus.

▪ Supports business with technology solutions.

▪ Helps businesses modernize legacy solutions/processes

▪ Positions IT as an enabler within the organization

▪ Typically ensures EA is practiced within the organization

CIO

▪ Information security risk and compliance focus.

▪ Supports business with frameworks to properly govern, evaluate, and respond to risks.

▪ Partially takes ownership of security toolset

▪ Position Security capabilities as a business enabler

2

Page 11: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Traditional EA▪ Metamodel has no Risk and Security elements and relationships▪ Solution architects consider risk and security as non-functional

requirements▪ Risk and security teams involved in projects post-solution design

▪ Understanding risks and the assets exposed to risks▪ Choosing correct risk assessment methods and management

processes▪ Integrating Security and Risk Management into the EA practice ▪ Generating appropriate views for demonstrating Compliance▪ Vulnerabilities and threats landscape▪ Design patterns, mechanisms and services used to mitigate risk

and implement controls▪ Defining a complete implementation and change roadmap at

enterprise level

Business Architecture

IS (Application, Info & Data) Architecture

Technology Architecture

2

Missing information security aspects

?

Page 12: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Traditional Security Architecture

Contextual

Conceptual

Logical

Physical

Component

Security

2

▪ Typically independent approach from EA

▪ Security architecture document typically the last document deliverable post data, application, and technology architectures

▪ Frequently, security aspects of a system are analyzed and designed separately

ConfidentialityIntegrity

Availability

Page 13: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Key role updates2

▪ Ensure full integration of Security and Risk in the Architecture Value Chain▪ Integrate new changes in the EA repository. ▪ Update changes in metamodel relationships and concepts▪ Ensures security and risk support business strategy and objectives.

▪ Embeds Security Design Patterns into the solution in collaboration with the Security Solution Architect if necessary

▪ Sign off Solution Design and UAT

Enterprise Architect

▪ Capture security requirements▪ Update risk, threats, vulnerability catalogues and relationships in EA repository▪ Define and populate Security Design Patterns in architecture repository▪ Vet IT Solution Architectures from a Security perspective▪ Use Solution Risk Assessment for new design patterns▪ Co-signatory on Solution Design UAT

Solution Architect

Security Solution Architect

Page 14: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

How to align to business Risk?How do we keep business and security aligned?

How do we minimize security gaps and remediations costs?

How do we embed security in the wider business?

What strategy can be used to develop security architecture as part of the enterprise architecture

?

How do we ensure security support the business ?

?

Questions to be addressed2

Page 15: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Security by Design

Page 16: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Risk-Based metamodeling: First try x 11 3Business Attribute

profile

Security

Objective

Security

Category

Security Sub-

category

Security Domain

Security Service

Security Sub-

Service

Security Control

Risk

Asset

Threat

Vulnerability

Security Incident

Exploits

Causes

Treats

Reduces

Is targeted byExposes

Security

Requirement

Is quantified by

Is Attached to

Domain Owner

Is part of

Is part of

Is responsible for

Threat AgentRisk Owner

Is responsible for

Originates from

Wants to abuse

Is qualified by

Is part of

Is part of

Security Solution

Negative Business

Impact

Produces

Complies with

Decreases

Can lead to

Asset Class

StandardPolicy

Regulation

Reduces

Threat Domain

Threat Category

Qualifies

Is qualified by

Defines

Complies with

Security Mechanism

Security Component

(tool, technology,

product)

Is qualified by

Is implemented by

✓Business Driven Architecture

✓Bi-Directional Traceability

✓Context sensitive control compliance

✓Multi-domain policy architecture

✓ Impact and cost traceability

✓ Planning and change Management

✓ Efficiency✓Multiple viewpoints

Page 17: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

… but does not live in a vacuum3

Page 18: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

3 The outcome: ESA Metamodel - Security/Risk

Page 19: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Future dreams: Archimate alignment3

Page 20: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Enterprise Architecture [Enterprise Security

Architecture]

Security Solution

Architectures

Information Security

Reference Architecture

▪ Blueprint of reference for Solution Architects

▪ Includes policies, controls, procedure and guidelines

▪ Enforce the use of Design Patterns

▪ Vetted and approved as part of the established

governance framework

▪ Business and Risk-Driven approach

▪ Traceability for completeness & Justification

▪ Reusability of patterns, solutions and technologies

▪ Business value & cost to support/enable a strategy

▪ Understand business requirements and risks

▪ Articulate security requirements: Core and Generic

▪ Make use of patterns from Reference Architecture

▪ Vet design, implementation & acceptance testing

3 Security by Design – ESA, SRA, SSA

Page 21: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

End Goal in EA & ESA: Capabilities enablement

Enterprise Security

Inter-operability Availability

Confidentiality

Compliant Integrity

Profitability

3Value-assured

Prioritized & proportional responses

Scalable scope

Agility - ease of implementation & management

Free use, open source, global standard

Demonstrates compliance

Two-way traceability

Seamless alignment to TOGAF, ITIL, ISO27000, NIST, CobIT, etc…

Page 22: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

EA in Practice : ADM phases3

Strategy

Requirement

Solution/Pattern

Product/Service

Technology

Bidirectional traceability

Secu

rity

Page 23: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

SABSA Approach Step by Step3

Business Driver

Business Attribute

Threat Analysis

Impact Analysis

Control Objective

Security Service

Identify Business Drivers

Prioritize Drivers

Translate drivers into security attributes

Conform to the SABSA Framework

Perform threat analysis

Identify actual threats to the business attributes

Use quantitative or qualitative methods to define impact realization of the threat on the identified business objectives

Define Control objectives to mitigate identified threats to acceptable level

Define Control objectives to mitigate identified threats to acceptable level

Page 24: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Putting it all together: SbD in EA 3

Page 25: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Putting it all together: SbD in EA 3Security is driven by business requirements rather than technical consideration

Directly traceable to business objectives

Cost Effective

Meet legal, regulatory and policy compliance requirement by design

Alignment of business risk and organizations risk appetite

2

3

1

5

4

Risk

Cost

Usability

Page 26: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Conclusion

Page 27: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Risk

Cost

Usability

▪ Blueprint of reference for Solution Architects

▪ Includes policies, controls, procedure and guidelines

▪ Meet compliance and align with risk appetite

▪ Driven by organization business requirement

▪ Business and Risk-Driven approach

▪ Traceability for completeness & Justification

▪ Provide structured framework for compliance purpose

▪ Create foundation for assessment of security ROI

▪ Eliminate redundant controls

▪ Reduce Ad hoc implementation

▪ Provides agreed security requirement

▪ Tracible security requirement to business requirement

4 Security by Design – Benefits

Page 28: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

EA & ESA: Reference architecture compliance4Solution Design process initiated by business

Solution Design presented to Design Authority for approval

Design Authority select relevant architecture under governance

Design Authority checks high level conformance, either “approve” or refers back for “revision” by solution team

Checks

A

B

D

C

Page 29: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Thank you

Page 30: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Bonus round?

Page 31: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Risk assessment methods

OpenFAIR

NIST800-30

Page 32: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

EA Metamodeling: an example

Business StrategyRisk and Security

Strategy

Security Requirement

Regulation, Policy and Standard

Business Requirement

Threat and Vulnerabilities

Security Mechanism

Security tool, component, technology

Security Service

Technology Infrastructure

Vision

Business ProcessBusiness Risk

Security Controls

Data, Information and Application

Security Solution

Business

Information System

Technology

Planning

Security Mechanism

Security tool, component, technology

Security Solution

Strategy

Requirement

Solution/Pattern

Product/Service

Technology

Bidirectional traceability

Page 33: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Vision

Business Process

Business

Information System

Technology

Planning

BP Patterns XX Brand protectorBP RFP

Strategy

Requirement

Solution/Pattern

Product/Service

Technology

Bidirectional traceabilityIncrease

ReputationBuild new offerings

Protect brand

Brand Policy

More Advert fora

Aggressive marketing

Check forum using brand

Usage of brand for

fraud

Scan all fora with Logo

Detect, report malicious usage

of brand

Malicious usage of

brand

Unauthorized access to customer

Data

Brand Protection Software

Advert App Server

Marketing App Server

Advert App

Marketing App

Scan fora with brand

Brand detection scanner

EA Metamodeling: Views & Business attributes

Page 34: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

Preliminaries for Integration: Some Key security Concepts

Security Service

• A fundamental logical building block for constructing security solution architectures• Creating a repository of standardised security services is part of an enterprise security

architecture, providing security architects with a library of security service definitions for use ‘off-the-shelf’ when synthesising solution security architectures.

Security Mechanism

• A security mechanism is a type of technology or process that can deliver a security service.

• Different mechanisms may be used to provide the same service, depending on the actual context.

• Some services may be sub-services of higher-level services. • Service: Access Control; sub-service: Authentication;

Mechanism: ID and password.

Security Sub-service

Page 35: The South African EA Forum - Real IRMNgoie Wandelewe is the Solutions/Enterprise Architect ... backgrounds make us learn from each other . Enterprise Architecture (EA) Enterprise Security

References1. Kurpjuweit, S. and Winter, R., 2009. Concern-oriented business architecture engineering.

In Proceedings of2. the 2009 ACM symposium on Applied Computing (SAC '09), pp. 265-272.3. Kvale, S. and Brinkmann, S., 2009. InterViews: Learning the Craft of Qualitative Research4. Interviewing.2nd ed.SAGE publications.5. Langenberg, K. and Wegmann, A., 2004. Enterprise Architecture: What Aspects is Current

Research6. https://whatis.techtarget.com/definition/security-by-design7. https://www.owasp.org/index.php/Security_by_Design_Principles8. Amer, H.S. and Hamilton, J.A., 2008. Understanding Security Architecture. Proceedings of

the 2008 Spring simulation multiconference (SpringSim ’08),pp. 335-342