0% found this document useful (0 votes)
32 views

Module 5: Enterprise Security Using Zachman Framework: Lecture Materials For The John Wiley & Sons Book

This document discusses enterprise architecture and security using the Zachman Framework. It provides an overview of the Zachman Framework, including that it is made up of six fundamental interrogatives across six perspectives to provide a comprehensive view of an enterprise. It describes how the Zachman Framework can help with cybersecurity by providing a blueprint of an organization to understand how changes may impact security. The document also discusses different techniques that can be used to populate the Zachman Framework, such as document mining, hierarchy formation, and enterprise workshops.

Uploaded by

shreya n patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views

Module 5: Enterprise Security Using Zachman Framework: Lecture Materials For The John Wiley & Sons Book

This document discusses enterprise architecture and security using the Zachman Framework. It provides an overview of the Zachman Framework, including that it is made up of six fundamental interrogatives across six perspectives to provide a comprehensive view of an enterprise. It describes how the Zachman Framework can help with cybersecurity by providing a blueprint of an organization to understand how changes may impact security. The document also discusses different techniques that can be used to populate the Zachman Framework, such as document mining, hierarchy formation, and enterprise workshops.

Uploaded by

shreya n patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Module 5: Enterprise

Security Using Zachman


Framework
Lecture Materials for the John Wiley & Sons book:
Cyber Security: Managing Networks, Conducting
Tests, and Investigating Intrusions

April 30, 2021 DRAFT 1


What is Security Architecture?
Why Do We Need It?
• Architecture is the design of a complex structure that
enable change and reuse
– An office building blueprint
– Peoplesoft solution architecture
– An enterprise architecture
• Enterprise architecture is the architecture of an
enterprise, e.g.
– The Ohio State University
– The State Department
• The goal of strategy and enterprise architecture is
enterprise agility, i.e. what’s needed for competitiveness
and success
4/30/2021 DRAFT 2
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Enterprises are Very Complex
and Changing
• Imagine a complex building: The US Capitol
– Its blueprints capture bricks, mortar, plumbing, electrical,
HVAC
• Imagine an enterprise, such as the US Congress
– Its enterprise architecture includes the building blueprints…
plus:
– The people, the furniture, the computers, electronics, and
constant change
• Incorporating cybersecurity requirements in the
enterprise change process
– assures that changes result in secure systems and a secure
enterprise

4/30/2021 DRAFT 3
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
The Zachman Framework for
Enterprise Architecture

• Periodic Table of Enterprise Architecture


• Invented by John A. Zachman in mid
1980s
• Utilized by over 3000 large enterprises to
gain self understanding and agility

4/30/2021 DRAFT 4
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
4/30/2021 DRAFT 5
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Primitive Models versus
Composite Models
• A primitive model resides only within 1 cell
• A primitive model can exhaustively answer one
of the 6 fundamental interogatives (questions):
What, How, Where, When, Who, Why, for
example:
– What are all of the roles in an enterprise (Who?)
– What are all of the processes in the enterprise
(How?)
• Composite model crosses between columns,
e.g. a Role X Process matrix
4/30/2021 DRAFT 6
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
How do Architecture Frameworks
Help Us with Cyber Security?
• NIST Special Publication 800-39 defines the
role of Risk Executive
– Risk executive is in charge of business continuity
and disaster recovery, among other risks
• To do continuity and DR, an exhaustive list of enterprise
processes is required, i.e. what we populate Zachman
framework column 2 with (How?)
– Risk executive needs a blueprint of the organization
(Enterprise Architecture) to know whether or not to
approve changes
• If you conduct changes without a blueprint, catastrophy is
likely, e.g. building collapses

4/30/2021 DRAFT 7
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Everyone Has Their Own
Specifications
• Zachman rows represent the full range of
specification perspectives
– Executive
– Business Management
– Architect
– Engineer
– Technician
– The Enterprise
• Examples of common cybersecurity
specifications: System Security Plan, Plan of
Actions and Milestores, Accreditation Letter
4/30/2021 DRAFT 8
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
The Goldmine is in Row 2
• Row 2 is the Business Management
perspective
– Business managers control investment
decisions for the enterprise, i.e. the money
• Row 2 models are hierarchies
– All of the primitives are categorized in the
hierarchy
– Closeness in the hierarchy implies similarity
– A deep hierarchy represents a detailed
understanding of each set of primitives
4/30/2021 DRAFT 9
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Frameworks for Row 3
• Row 3 contains models from the Architect’s
perspective
• Architects do not specify every detail, that’s
what engineers do in Row 4
– Architects specify the architecturally significant
constraints, i.e. critical success factors
• Example Row 3 Frameworks
– For defense industry: DODAF, MODAF
– Solution Architectures: TOGAF, IEEE-1471,
ISO/IEC 42010
– Telecomm and Finance: RM-ODP
4/30/2021 DRAFT 10
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Architectural Problem Solving
Patterns
• Business Question Analysis
• Document Mining
• Hierarchy Formation
• Enterprise Workshop
• Nominal Group Technique
• Minipatterns for Problem Solving
Meetings

4/30/2021 DRAFT 11
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Business Question Analysis

• Determines the appropriate metamodel for an


enterprise architecture
– “Metamodel” means what kinds of entities and
relationships will we model
• Starts with questions from business owners
– Proceeds with selection of primitives (columns)
from the Zachman Framework
– The business questions drive the relationships that
will be modeled, i.e. using matrices across columns

4/30/2021 DRAFT 12
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Document Mining
• Extracts primitives from enterprise
documentation, i.e. populates row 1
• Document mining can be exhaustive, i.e.
capture all the primitive entities in a column
• Document Mining is preferable to
interviewing because:
– Documents usually represent a consensus
of two or more people
– 1:1 interviews represent only 1 opinion on a
certain day in a certain life
4/30/2021 DRAFT 13
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Hierarchy Formation
• Hierarchy formation populates row 2 of
the Zachman Framework
• A hierarchy is created using a cards on
the wall exercise, group discussion
– Non-experts can perform this task
– Experts are used in an Enterprise Workshop
to confirm and perfect the results
• Hierarchies help us understand the
primitives and find commonality
4/30/2021 DRAFT 14
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Enterprise Workshop
• Document Mining and Hierarchy
Formation can be conducted by non-expert
teams
– The non-experts draft a 70% solution,
imperfect, but much better than a blank page
• Business owners and experts are called
into the Enterprise Workshop to take the
70% solution to 100%, in terms of accuracy
and completeness
4/30/2021 DRAFT 15
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Nominal Group Technique
• NGT is a classic idea creation technique, e.g. a
powerful form of brainstorming
– It very quickly generates results without substantial time
wasted in discussing digressions
• NGT involves:
– Silent writing – to formulate ideas quickly in a large group
working in parallel
– Group notes – recording of the ideas on a flip chart so that
everyone can be a heads-up active participant
– Group definitions – information sharing to define the ideas
– Straw poll – prioritizing the ideas by casting multiple informal
votes

4/30/2021 DRAFT 16
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Minipatterns for Problem
Solving Meetings
• Get Organized
• Breakouts
• Flipcharts
• Time Management
• Groundrules
• Idea Parking Lot
• Other Problem Solving Catalogs

4/30/2021 DRAFT 17
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
REFERENCES

• 1. William Stallings, ―Cryptography and


Network Security Principles and Practice‖,
Pearson Education Inc., 6th Edition, 2014,
ISBN: 978-93-325- 1877-3.
• 2. Thomas J. Mowbray, ―Cyber Security
– Managing Systems, Conducting Testing,
and Investigating Intrusions‖, John Wiley &
Sons, Inc.,2014

4/30/2021 DRAFT 18
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

You might also like