Enterprise Security Architecture
Enterprise Security Architecture
The world has changed; security is not the same beast as before. Today’s risk factors and threats are not
the same, nor as simple as they used to be. New emerging technologies and possibilities, e.g., the
Internet of Things, change a lot about how companies operate, what their focus is and their goals. It is
important for all security professionals to understand business objectives and try to support them by
implementing proper controls that can be simply justified for stakeholders and linked to the business risk.
Enterprise frameworks, such as Sherwood Applied Business Security Architecture (SABSA), COBIT and
The Open Group Architecture Framework (TOGAF), can help achieve this goal of aligning security needs
with business needs.
The COBIT 5 product family has a lot of documents to choose from, and sometimes it is tough to know
exactly where to look for specific information. Figure 2 shows the COBIT 5 product family at a
glance.2 COBIT Enablers are factors that, individually and collectively, influence whether something will
work.
The COBIT framework is based on five principles (figure 3). Applying those principles to any architecture
ensures business support, alignment and process optimization.3
By using a combination of the SABSA frameworks and COBIT principles, enablers and processes, a top-
down architecture can be defined for every category in figure 2. As an example, when developing
computer network architecture, a top-down approach from contextual to component layers can be defined
using those principles and processes (figure 4).
If one looks at these frameworks, the process is quite clear. This must be a top-down approach—start by
looking at the business goals, objectives and vision.
The initial steps of a simplified Agile approach to initiate an enterprise security architecture program are:
It is that simple. After all risk is identified and assessed, then the enterprise can start designing
architecture components, such as policies, user awareness, network, applications and servers.
Figure 6 depicts the simplified Agile approach to initiate an enterprise security architecture program.
A Real-Life Example
This section describes a simple and practical example of the steps that can be taken to define a security
architecture for an enterprise.
The enterprise in this example is a financial company, and their goal is to have an additional one million
users within the next two years. Some of the business required attributes are:
Not having a proper disaster recovery plan for applications (this is linked to the availability
attribute)
Vulnerability in applications (this is linked to the privacy and accuracy attributes)
Lack of segregation of duties (SoD) (this is linked to the privacy attribute)
Not Payment Card Industry Data Security Standard (PCI DSS) compliant (this is linked to the
regulated attribute)
All of the controls are automatically justified because they are directly associated with the business
attributes.
Like any other framework, the enterprise security architecture life cycle needs to be managed properly. It
is important to update the business attributes and risk constantly, and define and implement the
appropriate controls.
The life cycle of the security program can be managed using the TOGAF framework. This is done by
creating the architecture view and goals, completing a gap analysis, defining the projects, and
implementing and monitoring the projects until completion and start over (figure 5).
Using CMMI to Monitor, Measure and Report the Architecture Development Progress
Finally, there must be enough monitoring controls and key performance indicators (KPIs) in place to
measure the maturity of the architecture over time.
The first phase measures the current maturity of required controls in the environment using the Capability
Maturity Model Integration (CMMI) model. The CMMI model has five maturity levels, from the initial level
to the optimizing level.6 For the purpose of this article, a nonexistent level (level 0) is added for those
controls that are not in place (figure 7).
The aim is to define the desired maturity level, compare the current level with the desired level and create
a program to achieve the desired level.
This maturity can be identified for a range of controls. Depending on the architecture, it might have more
or fewer controls.
Procedural controls
o Risk management framework
o User awareness
o Security governance
o Security policies and standards
Operational controls
o Asset management
o Incident management
o Vulnerability management
o Change management
o Access controls
o Event management and monitoring
Application controls
o Application security platform (web application firewall [WAF], SIEM, advanced persistent
threat [APT] security)
o Data security platform (encryption, email, database activity monitoring [DAM], data loss
prevention [DLP])
o Access management (identity management [IDM], single sign-on [SSO])
Endpoint controls
o Host security (AV, host intrusion prevention system [HIPS], patch management,
configuration and vulnerability management)
o Mobile security (bring your own device [BYOD], mobile device management [MDM],
network access control [NAC])
o Authentication (authentication, authorization, and accounting [AAA], two factor, privileged
identity management [PIM])
Infrastructure controls
o Distributed denial of service (DDoS), firewall, intrusion prevention system (IPS), VPN,
web, email, wireless, DLP, etc.
The outcome of this phase is a maturity rating for any of the controls for current status and desired status.
After the program is developed and controls are being implemented, the second phase of maturity
management begins. In this phase, the ratings are updated and the management team has visibility of the
progress.
Conclusion
Regardless of the methodology or framework used, enterprise security architecture in any enterprise must
be defined based on the available risk to that enterprise. The enterprise frameworks SABSA, COBIT and
TOGAF guarantee the alignment of defined architecture with business goals and objectives.
Using these frameworks can result in a successful security architecture that is aligned with business
needs:
COBIT principles and enablers provide best practices and guidance on business alignment,
maximum delivery and benefits.
The COBIT Process Assessment Model (PAM) provides a complete view of requirement
processes and controls for enterprise-grade security architecture.
SABSA layers and framework create and define a top-down architecture for every requirement,
control and process available in COBIT.
The TOGAF framework is useful for defining the architecture goals, benefits and vision, and
setting up and implementing projects to reach those goals.
The CMMI model is useful for providing a level of visibility for management and the architecture
board, and for reporting the maturity of the architecture over time.
The simplified agile approach to initiate an enterprise security architecture program ensures that the
enterprise security architecture is part of the business requirements, specifically addresses business
needs and is automatically justified.
Endno