security - deloitte us€¦ · security enterprise architecture in a fast digitalizing environment...

4
Security March 2018 Security Enterprise Architecture In a fast digitalizing environment safeguarding the security of data is often a critical point for organizations. Many CIO’s struggle with the preservation of confidentiality, integrity, and availability of information used in the business processes, applications, and technology. Achieving these security objectives require a holistic and integrated approach from the start: Security by Design. As the main objective of Enterprise Architecture is to address and govern changes in the organization and IT in a holistic approach, the objectives of Enterprise Architecture and Security are closely aligned and even partly overlapping. At Deloitte, our objective is to help you create a secure Enterprise Architecture with a customized solution.

Upload: others

Post on 14-Jun-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security - Deloitte US€¦ · Security Enterprise Architecture In a fast digitalizing environment safeguarding the security of data is often a critical point for organizations. Many

SecurityMarch 2018

SecurityEnterprise Architecture

In a fast digitalizing environment safeguarding the security of data is often a critical point for organizations. Many CIO’s struggle with the preservation of confidentiality, integrity, and availability of information used in the business processes, applications, and technology. Achieving these security objectives require a holistic and integrated approach from the start: Security by Design.

As the main objective of Enterprise Architecture is to address and govern changes in the organization and IT in a holistic approach, the objectives of Enterprise Architecture and Security are closely aligned and even partly overlapping.

At Deloitte, our objective is to help you create a secure Enterprise Architecture with a customized solution.

Page 2: Security - Deloitte US€¦ · Security Enterprise Architecture In a fast digitalizing environment safeguarding the security of data is often a critical point for organizations. Many

Security – Enterprise Architecture

BackgroundManaging risks and protecting digital assets is often seen as the core responsibility of the CIO, the CISO, and the IT organization.While the need for security and privacy grows, the businesses struggle to address the security throughout the whole enterprise.

In a secure organization information is protected from unauthorized access and the integrity of information is always guaranteed. Security enables corporate information to be available at the right time to the right business process or person and business processes can always be executed when necessary. To achieve this, it is necessary to include security in Enterprise Architecture approach. Still, not many organizations are found to have a full integration of their Enterprise Architecture and security.

As commonly seen in enterprises, the information security capability functions separately from the Enterprise Architecture of the organization. Since security concerns are pervasive throughout the business, application, information and technology layers, security cannot be treated as a separate layer or domain but needs to be treated as a cross cutting concern.

Our approachThe most important question for many executives is whether the security is adequately addressed (i.e. throughout the whole Enterprise Architecture). Although for most businesses security is not a top business priority it remains as a constant boardroom agenda item. Security and risk management are often viewed by the business as a compliance chore, a cost to the business and/or an operational expense—which may not bode well for their ability to secure investments from the business to support these activities.

Drawing on both our technical experience and our business subject matter specialists our work enables your team to defend technology decisions on a verified accounting of what each decision means to your business.

Our comprehensive approach to design secure Enterprise Architectures consists of three fundamental elements: a shared language, integrated process and aligned deliverables.

First we start by ensuring a shared language is used by the Enterprise Architecture and security departments. A shared language is needed to enable effective and efficient communication between the departments.

Next we integrate the processes.The EA and Security teams need to share a combined way-of-working to ensure security is incorporated in the complete enterprise. The two standard approaches we use are TOGAF Architecture Development Method (Enterprise Architecture) and SABSA Lifecycle (Security Architecture). This enables the departments to work together in a structured way and provides a step-wise prescriptive approach for developing architectures, from scratch or from existing models.

“Forty-five percent of CIOs anticipate that cybersecurity will have asignificant impact on their business in the next two years.“

CIO Survey 2016–2017

Technology/infrastructure

Secu

rity

Application

Information/data

Business

Page 3: Security - Deloitte US€¦ · Security Enterprise Architecture In a fast digitalizing environment safeguarding the security of data is often a critical point for organizations. Many

Security – Enterprise Architecture

Finally aligned deliverables and templates are established. This supports delivery of quality content in a transparent way and provides various viewpoints on architecture and focuses on various aspects of each viewpoint.. The implementationThe next step in the process is assessing how secure your Enterprise Architecture is. A quick security scan is used to measure the degree of integration of Security in the deliverables of Enterprise Architecture, based on the NIST Cyber Security Framework.

This starts with checking the current state of the architecture and determining the goal. Next, we gather all related artifacts and review the requirements.Lastly, scores are allocated to functions prioritize. Based on these scores, functions that need attention are exposed and prioritized.

This unique approach results in a more conscious investment decisions, enables you to monitor the improvements and continuously check architecture models for the future.

Our capabilitiesWhile business risk is the key driver for security, security is an enabler of business strategy. Sixty-four percent of surveyed CIOs expect their technology spend on cybersecurity to increase.

Technological trends from the past years, such as the rise of Internet of Things and the migration to the Cloud also bring security issues along. These trends increase the volume of customer data, which makes Security breaches and data leaks major threats for your organization’s reputation.

This increases the need to assess the security of the Enterprise Architecture, and to assure that the security of the data is adequate.

Our capabilities cover a broad range of industries and the latest IT trends, which sets the stage for a deliberate and thoughtful transformation.

The Deloitte advantage

Successful Capability Development requires a holistic tailored approach addressing your specific organizational needs for different Enterprise Architecture maturity levels.

At Deloitte we carry an exhaustive consulting experience in improving Enterprise Architecture departments in many different markets, with national and international clients in different sizes. The knowledge sources are international, which entails that the latest best practices will be applied for your organization and specific needs.

We bring to bear operational experience and insight from both business and technology perspectives supported by leading industry experience.

“Deloitte ranked #1 by Gartner in Security Consulting Services for the 4th consecutive year.”

Page 4: Security - Deloitte US€¦ · Security Enterprise Architecture In a fast digitalizing environment safeguarding the security of data is often a critical point for organizations. Many

Security – Enterprise Architecture

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited (“DTTL”), its global network of member firms, and their related entities. DTTL (also referred to as “Deloitte Global”) and each of its member firms are legally separate and independent entities. DTTL does not provide services to clients. Please see www.deloitte.nl/about to learn more.

This communication is for internal distribution and use only among personnel of Deloitte Touche Tohmatsu Limited, its member firms and their related entities (collectively, the “Deloitte network”). None of the Deloitte network shall be responsible for any loss whatsoever sustained by any person who relies on this communication.

© 2018 Deloitte The Netherlands

ConclusionSecurity in Enterprise Architecture is a challenging process which requires continuous adaptation and an integrated approach.

In a fast digitalizing environment, the importance of security is heightened and a prerequisite.

Having the right road map in place—built out by a team of experienced professionals who can think beyond the technical, draw on a gold standard of vendor alliances, and know your business, goals, and industry in detail—won’t necessarily make it simple. But it will help ensure that the journey is achievable.

Contact us:

Sander van den BoschSenior ConsultantTel: +31 (0)88 288 6031Mobile: +31 (0)6 8333 0030E-mail: [email protected]

Sebastiaan KoenenConsultantTel: +31 (0)88 288 6688Mobile: +31 (0)6 8201 2417E-mail: [email protected]

Eric OnderdelindenDirectorTel: +31 (0)88 288 7884Mobile: +31 (0)6 8333 9816E-mail: [email protected]

“The fact that clients invest more in Deloitte’s security services than any other security consultant is a testament to our network’s client-centered approach and world-class capabilities.”