security models for security architecture

26
SECURITY MODELS FOR IMPROVING YOUR ORGANIZATION’S DEFENCE POSTURE AND STRATEGY Vladimir Jirasek Blog: JirasekOnSecurity.com Bio: About.me/jirasek 9 th Nov 2011

Upload: vladimir-jirasek

Post on 15-Jan-2015

7.374 views

Category:

Technology


4 download

DESCRIPTION

The presentations should help security professionals create security architecture that supports business objectives, covers all areas of security technology, and allows for effective measurement of security value.The presentation was given at BrighTalk

TRANSCRIPT

Page 1: Security models for security architecture

SECURITY MODELS FOR IMPROVING YOUR ORGANIZATION’S DEFENCE POSTURE AND STRATEGY

Vladimir Jirasek

Blog: JirasekOnSecurity.com

Bio: About.me/jirasek

9th Nov 2011

Page 2: Security models for security architecture

About me• Security professional (11 years)• Founding member and steering group member of

(Common Assurance Maturity Model) CAMM (common-assurance.com)

• Director, CSA UK & Ireland• I love reading books: thrillers (Clive Cussler) and

business management (Jo Owen)

Page 3: Security models for security architecture

I will cover topics today• Security model for information security• Security policy structure• Security processes• Security technology stack• Security metrics for organisations

Page 4: Security models for security architecture

Security model – business drives security

Information Security policies

Business objectives

Compliancerequirements

Laws & Regulations

Define

Security threats

International security

standards

Information Security

standards

Information Security Artefacts

Security intelligence

Line Management

Auditors

Risk & Compliance

Governance

Product Management

Program Management

Security Professionals

Security Metrics Portal

Information Security

Processes

Tech

nolo

gy

Policy framework

Security management

Peo

ple

Define security controls

Execute security controls

Information Security Metrics

objectives

Metrics framework

Measure security controls maturity

External security metrics

Rules Measure

Correction of security processes

Process framework

Inform

CEO & Board

Drivers

Page 5: Security models for security architecture

Information Security Policy framework

Information Security Policy

Information Technology Security Policy

IT security standards

[reuse internationally

accepted controls]

Security architecturerepository

Security guidelines

Technology

Processes

CISO

CIO

IT Security

Architecture

Technical teams

Business and Security

objectives

Security objectives

Controls and processes

Data classification policy

Employee Acceptable Use Policy

Page 6: Security models for security architecture

Security

Process P2

Security Process P4

Security

Process P3

Security

Process P1Business objective

BO1

Business objective

BO2

Business objective

BO3

Security Objective

SO1

Security Objective

SO2

Security Objective

SO3

Security Objective

SO4

Security Objective

SO5

Control C1

Control C2

Control C3

Control C4

Control C5

Control C6

Control C7

Control C8

Control C9

Control C10

Control C11

Relationship between business objectives and security processes

Provides response to “Do we have all business risks covered?”

Provides response to “Why are we doing this?”

Busine

ss process B1

Busine

ss process B2

Busine

ss process B3

International standards

Page 7: Security models for security architecture

Sources of security controls• ISO 27000 series• ISF Standard of Good Practice 2011• PCI DSS• NIST SP 800-53• CObIT 4• SANS 20 critical controls

Page 8: Security models for security architecture

Security technology stackGRC

Information & Event Mgmt

Iden

tity,

Ent

itlem

ent,

Acc

ess

Cry

ptog

raph

yData Security

Application Security

Host Security

Network Security

Physical Security

Organise security reporting around the stack

For each prepare current, target state analysis and roadmap

Page 9: Security models for security architecture

Security stack::Network• Network firewalls• VPN gateways• Network Intrusion Detection/Prevention • DDoS • WiFi security • Network Access Control • DNS Security• Web, Email & IM filtering

GRC

Information & Event Mgmt

Ide

ntity

, En

title

me

nt,

Acc

ess

Cry

pto

gra

ph

yData Security

Application Security

Host Security

Physical Security

Network Security

Page 10: Security models for security architecture

Network security relationshipsGRC

Information & Event Mgmt

Ide

ntity

, En

title

me

nt,

Acc

ess

Cry

pto

gra

ph

yData Security

Application Security

Host Security

Physical Security

Network Security

Page 11: Security models for security architecture

Security stack::Host• Configuration compliance• Patch management• Vulnerability scanning• Anti-malware• Application control• Location awareness• Device control• Trusted execution protection

GRC

Information & Event Mgmt

Ide

ntity

, En

title

me

nt,

Acc

ess

Cry

pto

gra

ph

yData Security

Application Security

Network Security

Physical Security

Host Security

Page 12: Security models for security architecture

Host security relationshipsGRC

Information & Event Mgmt

Ide

ntity

, En

title

me

nt,

Acc

ess

Cry

pto

gra

ph

yData Security

Application Security

Network Security

Physical Security

Host Security

Page 13: Security models for security architecture

Security stack::Application• Code reviews/scanning – binary and source• Security sensors (AppSensor)• Web application scanning• Penetration testing• Web protection (WAF)

GRC

Information & Event Mgmt

Ide

ntity

, En

title

me

nt,

Acc

ess

Cry

pto

gra

ph

yData Security

Network Security

Physical Security

Host Security

Application Security

Page 14: Security models for security architecture

Application security relationshipsGRC

Information & Event Mgmt

Ide

ntity

, En

title

me

nt,

Acc

ess

Cry

pto

gra

ph

yData Security

Network Security

Physical Security

Host Security

Application Security

Page 15: Security models for security architecture

Security stack::Data• Data classification• Email encryption• File encryption• Document Rights Management• Data Leakage protection• Watermarking• End point encryption• Database security

GRC

Information & Event Mgmt

Ide

ntity

, En

title

me

nt,

Acc

ess

Cry

pto

gra

ph

y

Network Security

Physical Security

Host Security

Application Security

Data Security

Page 16: Security models for security architecture

Data security relationshipsGRC

Information & Event Mgmt

Ide

ntity

, En

title

me

nt,

Acc

ess

Cry

pto

gra

ph

y

Network Security

Physical Security

Host Security

Application Security

Data Security

Page 17: Security models for security architecture

Security stack::IAEM• Principal management• Account provisioning• Rights management• Directories• Single sign on and Federation• Authorisation• Role and rights auditing• 2nd factor authentication

GRC

Information & Event Mgmt

Cry

pto

gra

ph

y

Network Security

Physical Security

Host Security

Application Security

Data Security

Ide

ntity

, En

title

me

nt,

Acc

ess

Page 18: Security models for security architecture

IAEM relationshipsGRC

Information & Event Mgmt

Cry

pto

gra

ph

y

Network Security

Physical Security

Host Security

Application Security

Data Security

Ide

ntity

, En

title

me

nt,

Acc

ess

Page 19: Security models for security architecture

Security stack::Cryptography• Key generation• Key escrow• Host and Network HSM• Certificate management & PKI

GRC

Information & Event Mgmt

Network Security

Physical Security

Host Security

Application Security

Data Security

Ide

ntity

, En

title

me

nt,

Acc

ess

Cry

pto

gra

ph

y

Page 20: Security models for security architecture

Cryptography relationshipsGRC

Information & Event Mgmt

Network Security

Physical Security

Host Security

Application Security

Data Security

Ide

ntity

, En

title

me

nt,

Acc

ess

Cry

pto

gra

ph

y

Page 21: Security models for security architecture

Security stack::SIEM• Collection of security relevant logs• Archiving – retention• Correlation with other data sources• Acting on security information• Ideal to use MSSP

GRC

Network Security

Physical Security

Host Security

Application Security

Data Security

Ide

ntity

, En

title

me

nt,

Acc

ess

Cry

pto

gra

ph

y

Information & Event Mgmt

Page 22: Security models for security architecture

SIEM relationshipsGRC

Network Security

Physical Security

Host Security

Application Security

Data Security

Ide

ntity

, En

title

me

nt,

Acc

ess

Cry

pto

gra

ph

y

Information & Event Mgmt

Page 23: Security models for security architecture

Security metrics characteristics• Measurable• Objective• Quantitative (ideally)• Meaningful• With KPIs attached – know what is good and bad• Linked to business objectives – money speaks

Page 24: Security models for security architecture

Metrics for CIO – Policy compliance and control maturity

Policy statement

IT Unit A IT Unit B IT Unit C Overall IT

Governance 3 3.5 2 3

Awareness 3 4 3 3.5

Development N/A 2 1 1.5

Hardening 4 N/A 2 3

Network N/A N/A 3 3

End devices 2 2 3 2

Overall 3 (£3m) 3 (100k) 2 (£10m) 3 (£13.1m)

Page 25: Security models for security architecture

Metrics for CIO – Maturity of controls for business processes/services

IT Service\Business process

Maturity VaR for Process A

VaR for Process B

VaR for Process C

VaR for IT service

IT Service 1 2 £1m £2m £1m £4m

Infrastructure 3 £1m £3m £10m £14m

IT Service 2 3 £0.5m N/A £20m £20.5m

IT Service 3 4 N/A £100k £500k £600k

Overall £2.5m £5.1k £31.5m £39.1m

Invest in IT service to lower the VaR

Page 26: Security models for security architecture

Summary• Business drives security• Reuse good content from information security community• Security policy framework – target audience, think of

implementation• Link security metrics to policy which is linked to business

objectives• All rounded security controls – good prevention against

cyber threats