Security Architecture
Security Architecture
Security architecture is a set of security principles, methods and models designed to align to
organisation objectives and help keep the organization safe from cyber threats. Security
architecture translates the business requirements to executable security requirements. .
The security infrastructure itself refers to the systems, processes, and tools already in place to
prevent or mitigate any damage from data breaches or other attacks on IT systems. The
infrastructure refers to t he supporting elements needed for functionality, and the architecture
refers to the cohesive design of the elem ents.
Security design refers to the techniques and methods that position those hardware and software
elements to facilitate security. Items like handshaking and authentication can be parts of network
security design.
In all of the areas listed above, the security architecture must contain a detailed, step-by-step
guide on how to carry out each task. Training could even be part of the security architecture,
especially when there are adjustments after an audit.
Benefits of Using the Security Architecture
Some of the benefits are mentioned below.
Help to protect the important company assets from the outside and provide security to the
important resources to the organization. The architecture provides the limited access to
the user so that the confidential data can be kept secure and safe.
The architecture defines the common policies and standards that can be used by the every
employee of the company and also define common rules so that no one face any
difficulty to use the system. It helps the organization to reach their goal and easily
conduct their business operations smoothly.
The other benefit is risk management activities covered by the architecture as the risk
management activity requires continuous assistance and also need continuous
improvement, the security architecture act as a better solution for them.
Challenges in creating an SA
Development of an optimal SA strategy can be difficult, especially when the following common
factors are in play:
Lack of communication and coordination among various departments or teams when it
comes to managing risks and maintaining IT security
Failure to clearly articulate the goals of the SA
Lack of understanding among users and stakeholders about the need to prioritize
information security
Difficulty calculating the cost and ROI of data protection software tools
Lack of funding to properly address security issues
Dissatisfaction with earlier security measures that were developed, such as spam filtering
that flags valid and critical correspondence
Earlier failures to meet regulatory requirements or business objectives,
Concerns about the ineffectiveness of earlier IT security investments
Phases of the Security Architecture Process
The four main phases of constructing a security architecture are as follows:
Risk Assessment
During the initial phase, the architect evaluates the business influence of vital assets, the
potential odds of an attack, and the effects of vulnerabilities and security threats. Risk
assessments provide a comprehensive overview of the current state of your enterprise’s
cybersecurity posture; you don’t know where to go if you don’t know where you’re starting!
Design
Following the risk assessment phase, the design and architecture of security services, which
facilitate business risk exposure objectives are developed by the architect. This is essentially the
roadmap for how to handle or fortify your business’s cybersecurity infrastructure and what
measures need to be taken for enhanced protection.
Implementation
Upon creating an overall plan, this next phase deals with putting steps into action. Security
services and processes are implemented, operated, and controlled; assurance services are
designed to ensure that the security policy and standards, security architecture decisions, and risk
management are mirrored in the real runtime implementation.
Operations & Monitoring
This final phase encompasses the subsequent day-to-day processes, such as threat and
vulnerability management and threat management. Here, measures are taken to supervise and
handle the operational state in addition to the depth and breadth of the system’s security. This
conclud
ing phase is just as important as the previous three and ensures continuous security measures are
in place and appropriately monitored
Security Architecture Framework
Security architecture framework is a consistent set of principles and guidelines for implementing
security architecture at different levels of the business. There are many international framework
standards, each solving a different problem.
Sherwood Applied Business Security Architecture (SABSA)
SABSA (Sherwood Applied Business Security Architecture) is a model and methodology for
developing a risk-driven enterprise information security architecture and service management, to
support critical business processes. It was developed independently from the Zachman
Framework, but has a similar structure. The primary characteristic of the SABSA model is that
everything must be derived from an analysis of the business requirements for security, especially
those in which security has an enabling function through which new business opportunities can
be developed and exploited.
The process analyzes the business requirements at the outset, and creates a chain of traceability
through the strategy and concept, design, implementation, and ongoing ‘manage and measure’
phases of the lifecycle to ensure that the business mandate is preserved. Framework tools created
from practical experience further support the whole methodology.
The model is layered, with the top layer being the business requirements definition stage. At
each lower layer a new level of abstraction and detail is developed, going through the definition
of the conceptual architecture, logical services architecture, physical infrastructure architecture
and finally at the lowest layer, the selection of technologies and products (component
architecture).
The SABSA model itself is generic and can be the starting point for any organization, but by
going through the process of analysis and decision-making implied by its structure, it becomes
specific to the enterprise, and is finally highly customized to a unique business model. It
becomes in reality the enterprise security architecture, and it is central to the success of a
strategic program of information security management within the organization.
SABSA is a particular example of a methodology that can be used both for IT (information
technology) and OT (operational technology) environments.
SABSA matrix
Assets Motivation Process Location
People (Who) Time (When)
(What) (Why) (How) (Where)
Business
Business risk Business organization Business Business time
Contextual The business
model process model and geography dependencies
relationships
Security Security entity
Business Security-
Control strategies and model and Security
Conceptual attributes related lifetime
objectives architectural trust domain model
profile and deadlines
layering framework
Security
Business Entity schema Security
Security Security domain
Logical information and privilege processing
policies services definitions and
model profiles cycle
associations
Users,
Security rules, Platform and Control
Business data Security applications
Physical practices and network structure
model mechanisms and user
procedures infrastructure execution
interface
Identities, Processes,
Security Security step
Detailed data Security functions, nodes,
Component products and timing and
structures standards actions and addresses and
tools sequencing
ACLs protocols
Security Application
Assurance of Operational Security of Security
service and user
Operational operational risk sites and operations
management management
continuity management platforms schedule
and support and support
COBIT
COBIT (Control Objectives for Information and Related Technology) helps organisations meet
business challenges in regulatory compliance, risk management and aligning IT strategy with
organisational goals. COBIT 5, the latest iteration of the framework, was released in 2012.
COBIT consists of four main components namely, plan and organize, acquire and implement,
deliver and support, and finally monitor and evaluate
COBIT 5 principles
COBIT 5 is based on five principles that are essential for the effective management and
governance of enterprise IT:
These five principles enable an organisation to build a holistic framework for the governance and
management of IT that is built on seven ‘enablers’:
Together, the principles and enablers allow an organisation to align its IT investments with its
objectives to realise the value of those investments.
Benefits of COBIT
PThinks of how MUST is integrating IT and its core business process. Using the knowledge you
have learned in risk management, security models, security protocols, security policy and
auditing, enterprise information architecture and security architecture frameworks, design a
enterprise security architeture for MUST based on COBIT .
rivacy Policy