<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Enterprise Security Architecture - a short overview in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Enterprise-Security-Architecture-a-short-overview/m-p/11070#M1035</link>
    <description>&lt;DIV class="user-generated-content typography post-content entry-summary"&gt;&lt;P&gt;A &lt;A href="https://www.peerlyst.com/tags/security-architecture" target="_blank"&gt;security architecture&lt;/A&gt;‍ is topic which has been more and more demanded, although stakeholders in organizations may still have quite different views on it and also very different expectations from it. In many cases it is just about solution design that is capable to resolve some &lt;A href="https://www.peerlyst.com/tags/security-issue" target="_blank"&gt;security issue&lt;/A&gt;, however it also includes &lt;A href="https://www.peerlyst.com/tags/strategic" target="_blank"&gt;strategic&lt;/A&gt; views and should drive &lt;A href="https://www.peerlyst.com/tags/development" target="_blank"&gt;development&lt;/A&gt; of future &lt;A href="https://www.peerlyst.com/tags/security-capabilities" target="_blank"&gt;security capabilities&lt;/A&gt; so the &lt;A href="https://www.peerlyst.com/tags/organization" target="_blank"&gt;organization&lt;/A&gt; is capable to deal with recent challenges. As it is obviously quite &lt;A href="https://www.peerlyst.com/tags/complex" target="_blank"&gt;complex&lt;/A&gt; topic, with many dependencies to &lt;A href="https://www.peerlyst.com/tags/internal" target="_blank"&gt;internal&lt;/A&gt; existing &lt;A href="https://www.peerlyst.com/tags/processes" target="_blank"&gt;processes&lt;/A&gt; in organizations, it may be worth to write few observations and clarify further the topic here among security professionals.&lt;/P&gt;&lt;P&gt;Well established &lt;A href="https://www.peerlyst.com/tags/security-architecture" target="_blank"&gt;security architecture&lt;/A&gt; function provides following &lt;A href="https://www.peerlyst.com/tags/services" target="_blank"&gt;services&lt;/A&gt; to the rest of organization:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://www.peerlyst.com/tags/security-consulting" target="_blank"&gt;Security Consulting&lt;/A&gt; in projects - &lt;A href="https://www.peerlyst.com/tags/threat-assessments" target="_blank"&gt;threat assessments&lt;/A&gt;, projects shaping, specify sec. requirements and &lt;A href="https://www.peerlyst.com/tags/review" target="_blank"&gt;review&lt;/A&gt; proposed solution &lt;A href="https://www.peerlyst.com/tags/architecture" target="_blank"&gt;architecture&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Security Services - planning and design of security services and &lt;A href="https://www.peerlyst.com/tags/solutions" target="_blank"&gt;solutions&lt;/A&gt;, maintain technology roadmap, capability &lt;A href="https://www.peerlyst.com/tags/model" target="_blank"&gt;model&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Reference architecture - develop and maintain reference models for implementing &lt;A href="https://www.peerlyst.com/tags/security-controls" target="_blank"&gt;security controls&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://www.peerlyst.com/tags/drivers" target="_blank"&gt;Drivers&lt;/A&gt; of #securityarchitecture are typically coming from frequent changes of &lt;A href="https://www.peerlyst.com/tags/business" target="_blank"&gt;business&lt;/A&gt; services, growing complexity of &lt;A href="https://www.peerlyst.com/tags/it-infrastructure" target="_blank"&gt;IT infrastructure&lt;/A&gt;, increased &lt;A href="https://www.peerlyst.com/tags/legal" target="_blank"&gt;legal&lt;/A&gt; and &lt;A href="https://www.peerlyst.com/tags/regulatory" target="_blank"&gt;regulatory&lt;/A&gt; requirements and traditional demands to &lt;A href="https://www.peerlyst.com/tags/reduce" target="_blank"&gt;reduce&lt;/A&gt; costs and improve efficiency.&lt;/P&gt;&lt;P&gt;As mentioned, term #securityarchitecture does not have commonly adopted and unique definition. Every organization interprets in its own way. Often there are three different views on what scope of the security architecture should be: the architecture at organization level, security architecture of an application level or security architecture design of specific &lt;A href="https://www.peerlyst.com/tags/vendor" target="_blank"&gt;vendor&lt;/A&gt; provided service or product.&lt;/P&gt;&lt;P&gt;Regarding dependencies and &lt;A href="https://www.peerlyst.com/tags/relationships" target="_blank"&gt;relationships&lt;/A&gt;, #enterprisesecurityarchitecture is seen as part of &lt;A href="https://www.peerlyst.com/tags/enterprise" target="_blank"&gt;enterprise&lt;/A&gt; IT architecture which is derived from both business requirements and security policies. Very nice overview of the &lt;A href="https://www.peerlyst.com/tags/taxonomy" target="_blank"&gt;taxonomy&lt;/A&gt; is provided by &lt;A href="http://www.opensecurityarchitecture.org/cms/index.php." target="_blank" rel="noopener"&gt;http://www.opensecurityarchitecture.org&lt;/A&gt; at the figure below:&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://res.cloudinary.com/peerlyst/image/upload/c_limit,h_434,w_592/v1/post-attachments/front_page_osa_metamodel_v002_kv7fiy" border="0" /&gt;&lt;/P&gt;&lt;P&gt;Assuming the security architecture consists of multiple representations that describe function, structure and relationships between security components in given organization, well defined and consistent security architecture &lt;A href="https://www.peerlyst.com/tags/framework" target="_blank"&gt;framework&lt;/A&gt; will contain these &lt;A href="https://www.peerlyst.com/tags/documents" target="_blank"&gt;documents&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;a.Enterprise Security Architecture Concept&lt;/STRONG&gt; is a high level description of overall security architecture approach, relevant &lt;A href="https://www.peerlyst.com/tags/domains" target="_blank"&gt;domains&lt;/A&gt; and common design principles. The document is to be used as baseline to build security architecture.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;b.Security Services and Controls Catalogue&lt;/STRONG&gt;- &lt;A href="https://www.peerlyst.com/tags/logical" target="_blank"&gt;logical&lt;/A&gt; view on existing ("as is") security services and controls with assessment of their maturity level. The document is to be used for reviewing current status of the security architecture and to ensure that existing security services are actually efficient as required.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;c. Architecture Reference Models&lt;/STRONG&gt;- logical view on target ("to be") security architecture models which provides details of &lt;A href="https://www.peerlyst.com/tags/threat" target="_blank"&gt;threat&lt;/A&gt; &lt;A href="https://www.peerlyst.com/tags/scenarios" target="_blank"&gt;scenarios&lt;/A&gt;, &lt;A href="https://www.peerlyst.com/tags/risks" target="_blank"&gt;risks&lt;/A&gt; and required security controls to be applied on different architecture layers within security domains.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;d&lt;/STRONG&gt;. &lt;STRONG&gt;Security Architecture Roadmap&lt;/STRONG&gt; - &lt;A href="https://www.peerlyst.com/tags/strategy" target="_blank"&gt;strategy&lt;/A&gt; definition with planned vision for acquiring or developing security services and controls. The document is to be used for budget planning and for making decisions to acquire new security capabilities.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;e. Security Patterns, Guidelines and Templates&lt;/STRONG&gt;- detailed view on standardized solutions for the problems that reoccur in many different situations. These documents represent most operationalized part of security architecture that issued as supporting documents for designing and implementing controls that resolve practical problems.&lt;/P&gt;&lt;P&gt;Benefits from established &lt;A href="https://www.peerlyst.com/tags/enterprise-security" target="_blank"&gt;enterprise security&lt;/A&gt; architecture are similar to benefits of IT architecture - cost effectiveness through &lt;A href="https://www.peerlyst.com/tags/standardization" target="_blank"&gt;standardization&lt;/A&gt;, &lt;A href="https://www.peerlyst.com/tags/risk" target="_blank"&gt;risk&lt;/A&gt; driven approach to development of security capabilities, better &lt;A href="https://www.peerlyst.com/tags/integration" target="_blank"&gt;integration&lt;/A&gt; of security capabilities, reusing of existing skills. However, despite several public architecture &lt;A href="https://www.peerlyst.com/tags/frameworks" target="_blank"&gt;frameworks&lt;/A&gt; such as &lt;A href="https://www.peerlyst.com/tags/sabsa" target="_blank"&gt;SABSA&lt;/A&gt;, TOGAF and ZACHMAN there are still number of challenges related to #securityarchitecture development as well as defining suitable processes to apply architecture framework and also to maintain it up to date. Finding right approach is not a simple &lt;A href="https://www.peerlyst.com/tags/task" target="_blank"&gt;task&lt;/A&gt;, but starting a vision for #securityarchitecture that is presented to security stakeholders and approved by &lt;A href="https://www.peerlyst.com/tags/management" target="_blank"&gt;management&lt;/A&gt; is in most cases first step forward.&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Fri, 01 Jun 2018 08:58:30 GMT</pubDate>
    <dc:creator>Stevandrag</dc:creator>
    <dc:date>2018-06-01T08:58:30Z</dc:date>
    <item>
      <title>Enterprise Security Architecture - a short overview</title>
      <link>https://community.isc2.org/t5/Industry-News/Enterprise-Security-Architecture-a-short-overview/m-p/11070#M1035</link>
      <description>&lt;DIV class="user-generated-content typography post-content entry-summary"&gt;&lt;P&gt;A &lt;A href="https://www.peerlyst.com/tags/security-architecture" target="_blank"&gt;security architecture&lt;/A&gt;‍ is topic which has been more and more demanded, although stakeholders in organizations may still have quite different views on it and also very different expectations from it. In many cases it is just about solution design that is capable to resolve some &lt;A href="https://www.peerlyst.com/tags/security-issue" target="_blank"&gt;security issue&lt;/A&gt;, however it also includes &lt;A href="https://www.peerlyst.com/tags/strategic" target="_blank"&gt;strategic&lt;/A&gt; views and should drive &lt;A href="https://www.peerlyst.com/tags/development" target="_blank"&gt;development&lt;/A&gt; of future &lt;A href="https://www.peerlyst.com/tags/security-capabilities" target="_blank"&gt;security capabilities&lt;/A&gt; so the &lt;A href="https://www.peerlyst.com/tags/organization" target="_blank"&gt;organization&lt;/A&gt; is capable to deal with recent challenges. As it is obviously quite &lt;A href="https://www.peerlyst.com/tags/complex" target="_blank"&gt;complex&lt;/A&gt; topic, with many dependencies to &lt;A href="https://www.peerlyst.com/tags/internal" target="_blank"&gt;internal&lt;/A&gt; existing &lt;A href="https://www.peerlyst.com/tags/processes" target="_blank"&gt;processes&lt;/A&gt; in organizations, it may be worth to write few observations and clarify further the topic here among security professionals.&lt;/P&gt;&lt;P&gt;Well established &lt;A href="https://www.peerlyst.com/tags/security-architecture" target="_blank"&gt;security architecture&lt;/A&gt; function provides following &lt;A href="https://www.peerlyst.com/tags/services" target="_blank"&gt;services&lt;/A&gt; to the rest of organization:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://www.peerlyst.com/tags/security-consulting" target="_blank"&gt;Security Consulting&lt;/A&gt; in projects - &lt;A href="https://www.peerlyst.com/tags/threat-assessments" target="_blank"&gt;threat assessments&lt;/A&gt;, projects shaping, specify sec. requirements and &lt;A href="https://www.peerlyst.com/tags/review" target="_blank"&gt;review&lt;/A&gt; proposed solution &lt;A href="https://www.peerlyst.com/tags/architecture" target="_blank"&gt;architecture&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Security Services - planning and design of security services and &lt;A href="https://www.peerlyst.com/tags/solutions" target="_blank"&gt;solutions&lt;/A&gt;, maintain technology roadmap, capability &lt;A href="https://www.peerlyst.com/tags/model" target="_blank"&gt;model&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Reference architecture - develop and maintain reference models for implementing &lt;A href="https://www.peerlyst.com/tags/security-controls" target="_blank"&gt;security controls&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://www.peerlyst.com/tags/drivers" target="_blank"&gt;Drivers&lt;/A&gt; of #securityarchitecture are typically coming from frequent changes of &lt;A href="https://www.peerlyst.com/tags/business" target="_blank"&gt;business&lt;/A&gt; services, growing complexity of &lt;A href="https://www.peerlyst.com/tags/it-infrastructure" target="_blank"&gt;IT infrastructure&lt;/A&gt;, increased &lt;A href="https://www.peerlyst.com/tags/legal" target="_blank"&gt;legal&lt;/A&gt; and &lt;A href="https://www.peerlyst.com/tags/regulatory" target="_blank"&gt;regulatory&lt;/A&gt; requirements and traditional demands to &lt;A href="https://www.peerlyst.com/tags/reduce" target="_blank"&gt;reduce&lt;/A&gt; costs and improve efficiency.&lt;/P&gt;&lt;P&gt;As mentioned, term #securityarchitecture does not have commonly adopted and unique definition. Every organization interprets in its own way. Often there are three different views on what scope of the security architecture should be: the architecture at organization level, security architecture of an application level or security architecture design of specific &lt;A href="https://www.peerlyst.com/tags/vendor" target="_blank"&gt;vendor&lt;/A&gt; provided service or product.&lt;/P&gt;&lt;P&gt;Regarding dependencies and &lt;A href="https://www.peerlyst.com/tags/relationships" target="_blank"&gt;relationships&lt;/A&gt;, #enterprisesecurityarchitecture is seen as part of &lt;A href="https://www.peerlyst.com/tags/enterprise" target="_blank"&gt;enterprise&lt;/A&gt; IT architecture which is derived from both business requirements and security policies. Very nice overview of the &lt;A href="https://www.peerlyst.com/tags/taxonomy" target="_blank"&gt;taxonomy&lt;/A&gt; is provided by &lt;A href="http://www.opensecurityarchitecture.org/cms/index.php." target="_blank" rel="noopener"&gt;http://www.opensecurityarchitecture.org&lt;/A&gt; at the figure below:&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://res.cloudinary.com/peerlyst/image/upload/c_limit,h_434,w_592/v1/post-attachments/front_page_osa_metamodel_v002_kv7fiy" border="0" /&gt;&lt;/P&gt;&lt;P&gt;Assuming the security architecture consists of multiple representations that describe function, structure and relationships between security components in given organization, well defined and consistent security architecture &lt;A href="https://www.peerlyst.com/tags/framework" target="_blank"&gt;framework&lt;/A&gt; will contain these &lt;A href="https://www.peerlyst.com/tags/documents" target="_blank"&gt;documents&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;a.Enterprise Security Architecture Concept&lt;/STRONG&gt; is a high level description of overall security architecture approach, relevant &lt;A href="https://www.peerlyst.com/tags/domains" target="_blank"&gt;domains&lt;/A&gt; and common design principles. The document is to be used as baseline to build security architecture.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;b.Security Services and Controls Catalogue&lt;/STRONG&gt;- &lt;A href="https://www.peerlyst.com/tags/logical" target="_blank"&gt;logical&lt;/A&gt; view on existing ("as is") security services and controls with assessment of their maturity level. The document is to be used for reviewing current status of the security architecture and to ensure that existing security services are actually efficient as required.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;c. Architecture Reference Models&lt;/STRONG&gt;- logical view on target ("to be") security architecture models which provides details of &lt;A href="https://www.peerlyst.com/tags/threat" target="_blank"&gt;threat&lt;/A&gt; &lt;A href="https://www.peerlyst.com/tags/scenarios" target="_blank"&gt;scenarios&lt;/A&gt;, &lt;A href="https://www.peerlyst.com/tags/risks" target="_blank"&gt;risks&lt;/A&gt; and required security controls to be applied on different architecture layers within security domains.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;d&lt;/STRONG&gt;. &lt;STRONG&gt;Security Architecture Roadmap&lt;/STRONG&gt; - &lt;A href="https://www.peerlyst.com/tags/strategy" target="_blank"&gt;strategy&lt;/A&gt; definition with planned vision for acquiring or developing security services and controls. The document is to be used for budget planning and for making decisions to acquire new security capabilities.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;e. Security Patterns, Guidelines and Templates&lt;/STRONG&gt;- detailed view on standardized solutions for the problems that reoccur in many different situations. These documents represent most operationalized part of security architecture that issued as supporting documents for designing and implementing controls that resolve practical problems.&lt;/P&gt;&lt;P&gt;Benefits from established &lt;A href="https://www.peerlyst.com/tags/enterprise-security" target="_blank"&gt;enterprise security&lt;/A&gt; architecture are similar to benefits of IT architecture - cost effectiveness through &lt;A href="https://www.peerlyst.com/tags/standardization" target="_blank"&gt;standardization&lt;/A&gt;, &lt;A href="https://www.peerlyst.com/tags/risk" target="_blank"&gt;risk&lt;/A&gt; driven approach to development of security capabilities, better &lt;A href="https://www.peerlyst.com/tags/integration" target="_blank"&gt;integration&lt;/A&gt; of security capabilities, reusing of existing skills. However, despite several public architecture &lt;A href="https://www.peerlyst.com/tags/frameworks" target="_blank"&gt;frameworks&lt;/A&gt; such as &lt;A href="https://www.peerlyst.com/tags/sabsa" target="_blank"&gt;SABSA&lt;/A&gt;, TOGAF and ZACHMAN there are still number of challenges related to #securityarchitecture development as well as defining suitable processes to apply architecture framework and also to maintain it up to date. Finding right approach is not a simple &lt;A href="https://www.peerlyst.com/tags/task" target="_blank"&gt;task&lt;/A&gt;, but starting a vision for #securityarchitecture that is presented to security stakeholders and approved by &lt;A href="https://www.peerlyst.com/tags/management" target="_blank"&gt;management&lt;/A&gt; is in most cases first step forward.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 01 Jun 2018 08:58:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Enterprise-Security-Architecture-a-short-overview/m-p/11070#M1035</guid>
      <dc:creator>Stevandrag</dc:creator>
      <dc:date>2018-06-01T08:58:30Z</dc:date>
    </item>
  </channel>
</rss>

