IT Architecture Review: ISACA Conference Fall 2003
IT Architecture Review: ISACA Conference Fall 2003
Page 2
Introduction
IT Architectural Design:
Page 3
Business Drivers
• Potential drivers for the implementation of N Tier
Architecture
– Limitations of the Classic Architecture
• Low Flexibility
– Difficult to enhance systems functionality or expand into new
products
• Poor Scalability
– Scalability is costly and limited by the architecture’s design
– Competitive Factors
• Barriers to Entry
– Ease of competitor’s entering the market
– Strategy
• Globalization
– Ability to implement regionalized ecommerce sites
Page 4
Overview of Tiered Architecture
Page 5
Client-Server Paradigm (1 of 3)
• Client/server architecture
– Introduced in the early 80’s
– clients and servers are separate logical objects that
communicate with each other to perform a task
together
Page 6
Client-Server Paradigm (2 of 3)
• Clients
– Entities that request services of another computer
system or process using an established protocol and
accept the server’s response
– Client makes a request for a service and receives a
reply to that request
• Servers
– Entities that provide requested services
– Server waits, receives, processes requests and then
sends back a response
Page 7
Client-Server Paradigm (3 of 3)
• Benefits of client/server architectures
– Code is re-usable
• When properly designed, the same code may be used in
many different instances
• One may design a system that responds automatically to
increase in system load by adding new servers and services
without too much difficulty
– Modular and Extensible
• Allows for fault tolerant systems
• One service can be offered on many different machines
• No single point of failure
Page 8
Tiered Architecture (1 of 2)
• Classic two-tier "Fat-Client"
model:
– Tier One: Customer access system PRESENTATION TIER
and gateway services. Also performs APPLICATION TIER
presentation and customer
application services BUSINESS TIER
– Tier Two: Provides business logic DATA TIER
and database services
• Disadvantages:
– Poor Scalability
– Maintenance – upgrades have to be
deployed to all clients
Page 9
Tiered Architecture (2 of 2)
• N Tier Architecture
– Tier One: Client side: browser/WAP/PDA.
Server side: Markup tags
– Tier Two: Data Encryption, Port PRESENTATION TIER
Assignments
– Tier Three: Business objects and Rules,
Data Transformation APPLICATION LOGIC
– Tier Four: Data Access Objects, ODBC,
JDBC, XML
– Tier Five: Data Repositories BUSINESS LOGIC
Page 10
IT Architecture Review
Page 11
IT ARCHITECTURE REVIEWS
Page 12
Why Review IT Architecture
Page 13
How to Conduct IT Architecture Reviews
Page 14
What to review and assess
• Logical - functional requirements of IT architecture
– Abstraction & encapsulation
– Information hiding
– Separation
– modularization
• Process – abilities of the system that can be measured
– Flexibility
– Security
– Scalability
– Performance
– Reliability
– Availability
– Maintainability
• Infrastructure – Physical infrastructure and system
components
Page 15
Non-Functional Requirements (1 Of 2)
• Scalability
– May be expanded or reduced in size to meet business requirements
– Bottlenecks can be resolved by adding more hardware/memory/processing power
– constraints are not imposed by the software
– ability to easily adjust for the number of concurrent users, data storage requirements,
network capacity, and so forth
• Reliability
– Systems perform consistently in both normal and adverse conditions within the accepted
operational cycle (24x7) and system downtime
– In the event of hazards, peak traffic loads, or attacks, systems appear to operate smoothly to
users while allowing for intuitive, effective management and recovery by the staff
– Eliminates single points of failure
• Flexibility
– The ability to expediently add new products and services to the architecture in response to
business needs
– Essential to providing flexibility is designing code as discrete, re-useable modules in addition
to selecting products that support well-known standards
– Avoiding product customization when integrating the components to the architecture also
aids flexibility
Page 16
Non-Functional Requirements (2 Of 2)
• Performance
– Good performance means the interval from the time the user enters a
request to the time a response is received encourages use of the
system
– Performance factors include the ability to quickly route HTTP traffic,
handle SSL sessions, complete a transaction, and return a third-party
service
• Manageability
1. Operational - All non trivial systems contain the instrumentation to be
proactively managed by an administration tool. Responses to
messages from nodes (e.g. SNMP traps) are automated and
sophisticated. Management traffic is not excessive and a burden to the
network
2. Development Approach – The design of the architecture facilitates code
re-use and efficient debugging. The manner in which services and logic
are partitioned within the architecture is intuitive and results in
components playing discrete, well-defined roles
Page 17
Infrastructure Requirements
• Ability to Duplicate
– It is possible to replicate the system at another location
– The architecture is transparent at the conceptual level, and its
components are suitable for an international environment (e.g.
well-known abroad, available in foreign languages)
• Long-Term Viability
– The design of the architecture is based on state-of-the-art yet
proven concepts and built using best of breed products.
Page 18
Infrastructure Components
• Logical view of the architecture helps one
understand how the infrastructure fits together at
a conceptual level
Page 19
Infrastructure Components
1. Clients
• e.g. web browsers or telephones connecting to the IVR
(Interactive Voice Response), using company resources and
services
2. Network components
• Includes firewalls and web traffic dispatchers
3. Web servers
• Handles HTTP requests and securing communications via SSL
4. Application servers
• Focuses on presentation and session management services
Page 20
Infrastructure Components
5. Business logic and transaction servers
• Manage and execute transactions
6. Database servers
• Data storage and management
Page 21
Performing the Assessment
- Example
Page 22
Example: Performing the Assessment
• Areas to consider for assessment: Information Resource Planning,
Business Continuity Planning, Architecture Development, and
Security
Page 23
Performing the Assessment
• What to ask:
– Has the organization established Internet security policies and
procedures as part of its general information protection strategy?
– What types of authentication technology are in use within the
network (i.e. single sign-on, token technology, call & response,
certificate authorities)? How are these technologies integrated
with the Internet technologies?
– Is adequate security implemented throughout the network (i.e.
from client to web server, from web server to backend system,
from web server to database, etc)?
– Does the organization use encryption technology to protect
transmitted data (internal and/or external transmissions)?
Page 24
Performing the Assessment
• What to ask:
– Does the organization have its public Internet servers certified by
a certificate authority, such as Verisign to protect against
imitation servers on the public network.
– Does the organization employ any types of virus protection
technology to mitigate the risk of introduction of destructive items
from the public network?
– What types of security tools/utilities are in use?
– Where are Internet servers deployed, inside or outside the
firewall?
– How are security breaches detected and communicated?
– What procedures are followed to neutralize security threats once
they are detected?
– Do audit procedures exist to periodically review the security
status of the network and Internet systems and identify instances
of potential threatening activity?
– Are audit logs being recorded (audit tools and/or the operating
system) and reviewed regularly?
Page 25
Performing the Assessment
What to do:
Page 26
Performing the Assessment
What to do:
Page 27
Relevant Issues
Page 28
Relevant Issues
• Information Security
• Software Development Lifecycle
Page 29
Information Security (1 of 3)
• Relevant Concerns
– Loss of Customer Trust
– Loss of Brand Value
• SB1386 requires that a company “…disclose in specified
ways, any breach of the security of the data, as defined, to
any resident of California whose unencrypted personal
information was, or is reasonably believed to have been,
acquired by an unauthorized person”
Page 30
Information Security (2 of 3)
• Examples Include:
– JetBlue Airways
• Violated its own privacy policy
• Provided 5 million passenger itineraries to a Defense
Department contractor that used the information as part of a
study seeking ways to identify "high risk" airline customers”
– FTC Study
• 1 in 7 Americans are victims of Identity Theft
Page 31
Information Security (3 of 3)
Page 32
Systems Development Life Cycle (1 of 2)
• Relevant Concerns
– Inappropriate access
– Application Instability
– Maintenance Issues
Page 33
Systems Development Life Cycle (2 of 2)
Page 34
Q&A
• Questions
Page 35