You are on page 1of 1

Reference Architecture

Guiding Principles
q Define protections that enable trust in the cloud. q Develop cross-platform capabilities and patterns for proprietary and open-source providers. q Will facilitate trusted and efficient access, administration and resiliency to the customer/consumer. q Provide direction to secure information that is protected by regulations. q The Architecture must facilitate proper and efficient identification, authentication, authorization, administration and auditability. q Centralize security policy, maintenance operation and oversight functions. q Access to information must be secure yet still easy to obtain. q Delegate or Federate access control where appropriate. q Must be easy to adopt and consume, supporting the design of security patterns q The Architecture must be elastic, flexible and resilient supporting multi-tenant, multi-landlord platforms q The architecture must address and support multiple levels of protection, including network, operating system, and application security needs.

Version 2.0

Business Operation Support Services (BOSS)


Compliance
Audit Planning Independent Audits Third-Party Audits Internal Audits Contact/Authority Maintenance

Information Technology Operation & Support (ITOS)


IT Operation
DRP
Plan Management Test Management

Presentation Services
Presentation Platform Presentation Modality
Consumer Service Platform
Social Media Search

End-Points
Mobile Devices
Mobile Device Management

Security and Risk Management


Speech Recognition (IVR)

Enterprise Service Platform


B2E B2M B2C

Desktops
Company owned Third-Party Public Kiosk

Colaboration E-Mail e-Readers

B2B P2P

Portable Devices Fixed Devices

Governance Risk & Compliance


Compliance Management Vendor Management Policy Management
Exceptions
Self Assessment

InfoSec Management
Capability Mapping Risk Portfolio Management Risk Dashboard

Medical Devices

Smart Appliances

Handwriting (ICR)

High Level Use Cases

IT Governance
Architectrure Governance Standards and Guidelines

Secure Sandbox

Audit Management

IT Risk Management

Technical Awareness and Training

Residual Risk Management

Information System Regulatory Mapping

Intellectual Property Protection

Privilege Management Infrastructure

Data Governance
Data Ownership / Stewardship Secure Disposal of Data
SaaS, PaaS, IaaS

Resource Management
Segregation of Duties Contractors

PMO
Program Mgmnt Project Mgmnt Remediation

Portfolio Management
Maturity Model Roadmap Strategy Alignment Input Validation Security Design Patterns

Application Services
Programming Interfaces Security Knowledge Lifecycle
Attack Patterns Code Samples Security Application Framwrok - ACEGI

Identity Management
Domain Unique Identifier Identity Provisioning Federated IDM Attribute Provisioning

Authentication Services
Risk Based Multifactor Auth Smart Password OTP Card Management Biometrics Network Authentication Single Sign On Middleware WS-Security Authentication Identity Verification OTB AutN SAML Token

Data Classification Clear Desk Policy

Handling / Labeling / Security Policy Rules for Information Leakage Prevention Rules for Data Retention

Integration Middleware

Operational Risk Management


Operational Risk Committee Business Crisis Management Impact Analysis Key Risk Indicators Business Continuity Planning Testing

Human Resources Security


Employee Termination Background Screening Roles and Responsibilities Employment Agreements Job Descriptions Employee Awareness

Service Delivery
Service Level Management
Objectives OLAs Internal SLAs External SLAs

Information Technology Resiliency


Availability Management Resiliency Analysis

Development Process
Self-Service
Security Code Review Application Vulnerability Scanning Stress and Volume Testing

Connectivity & Delivery

Software Quality Assurance

Entitlement Review Policy Policy Definition Enforcement Principal Data Policy Management Mangement Resource Data XACML Management Role Obligation Management Out of the Box (OTB) AutZ

Authorization Services

Privilege Usage Management


Keystroke/Session Logging Privilege Usage Gateway Password Vaulting Resource Protection

Hypervisor Governance and Compliance

Abstraction

Vendor Management Service Dashboard

Threat and Vulnerability Management


Compliance Testing Vulnerability Management
Application Infrastructure DB Databases Servers Network

Capacity Planning

Risk Management Framework Business Technical Assessment Assessment Independent Risk Management

Employee Code of Conduct

Information Services
Application Performance Monitoring

Asset Management
Service Costing Charge Back Operational Bugdeting Investment Budgeting

Service Delivery
Service Catalog SLAs OLAs Dashboard Recovery Contracts Plans

Reporting Services
Data Mining Reporting Tools Business Intelligence
PMO Strategy Roadmap

ITOS

Problem
Management

Incident
Management

BOSS
Risk Assessments Data Classification Process Ownership

Penetration Testing
Internal External

Threat Management
Source Code Scanning Risk Taxonomy

Security Monitoring Services


SIEM Platform Event Correlation Event Mining Database Monitoring Application Monitoring Honey Pot End-Point Monitoring Counter Threat Management Anti-Phishing User Behavior & Profile Patterns Cloud Monitoring E-Mail Journaling Market Threat Intelligence

CMDB

Knowledge
Management

Data Governance
Risk Assessments NonProduction Data Information Leakage Metadata Session Events

Security Monitoring
Service
Management

Change
Management

Audit Findings

SOC Portal Managed Security Services Knowledge Base Branding Protection

Service Support Service Support


Configuration Management
Configuration Rules (Metadata) Configuration Management Database (CMDB) Service Events

Authorization Events

Authentication Events

HR Data (Employees & Contractors)

Business Strategy

Application Events

Network Events

Computer Events

Behavioral Malware Prevention White Sensitive File Listing Protection AntiHIPS / Host Virus HIDS Firewall

Server

Infrastructure Protection Services


Anti-Virus, Anti-Spam, Anti-Malware Media Lockdown

End-Point
HIPS /HIDS

Host Firewall Behavioral Malware Prevention

Data Segregation HIPS NIPS Events

Hardware Based Trusted Assets Content Filtering

User Directory Services


Active Directory Services LDAP Repositories DBMS X.500 Repositories Repositories

Network
Behavioral Malware Prevention Firewall Content Filtering DPI Inventory Control NIPS / Wireless NIDS Protection Link Layer Network Security Black Listing Filtering

Forensic Tools White Listing

Real-time internetwork defense (SCAP)

Legal Services
Contracts E-Discovery Incident Response Legal Preparation

Internal Investigations
Forensic Analysis e-Mail Journaling

Capacity Planning Automated Asset Discovery

Software Management Configuration Management

Physical Inventory

Knowledge Repository

Risk Management
GRC RA BIA

Transformation Services
Database Events Privilege Usage Events

Application
XML Applicance Application Firewall Secure Messaging Secure Collaboration
Real Time Filtering

Change Logs

DR & BC Plans

VRA

TVM

ACLs

CRLs

Compliance Monitoring

NIPS Events

DLP EVents

eDiscovery Events

Registry Services

Location Services

Federated Services

Virtual Directory Services

Meta Directory Services

Data Protection
Data lifecycle management
Meta Data Control eSignature
(Unstructured data)

Incident Management
Security Incident Response

Problem Management
Event Classifiation Trend Analysis Root Cause Analysis Problem Resolution

Automated Ticketing Ticketing

Self-Service

Internal Infrastructure

Infrastructure Services
Asset Handling
Data Software Hardware

Cross Cloud Security Incident Response

Virtual Infrastructure
Remote

Data De-Identification Life cycle management

Data Masking Data Obscuring

Data Tagging Data Seeding

Orphan Incident Management

Facility Security
Controlled Physical Access
Barriers Security Patrols Electronic Surveillance Physical Authentication

Knowledge Management
Best practices Trend Analysis Benchmarking Security Job Aids Security FAQ

Patch Management
Compliance Monitoring Service Discovery

Servers
Secure Build Image Management

Desktop Client Virtualization


Local
SessionBased VM-Based (VDI)

Storage Virtualization << insert Jairos content> Block-Based Virtualization


Host-Based

Data Loss Prevention


Data Discovery Network
(Data in Transit)

Intellectual Property Protection


Intellectual Property Digital Rights Management

LDM LUN

LVM

Storage DeviceBased

Network-Based

Appliance Switched

End-Point
(Data in Use)

Server
(Data at Rest)

Change Management

Domain
Container
Process or Solution Data

SABSA ITIL v3 TOGAF JERICHO

Service Provisioning

Approval Workflow

Change Review Board Emergency Changes

Release Management
Scheduling Testing Version Control Build Source Code Management

Environmental Risk Management


Physical Security Equipment Location Power Redundancy

Equipment Maintenance Availability Services

Application Virtualization

End Point

Client Application Streaming

Server Application Streaming

Virtual Workspaces
Vertical Isolation

File-Based Virtualization

Symmetric Keys

Cryptographic Services Signature PKI Key Management Services


Asymmetric Keys
Data-in-Transit Encryption
(Transitory, Fixed)

Data-in-use
Encryption (Memory)

Data-at-Rest Encryption
(DB, File, SAN, Desktop, Mobile)

Server Virtualization
Virtual Machines (Hosted Based)
Full Paravirtualization Hardware-Assisted

Network Virtualizaton Network Address


Space Virtualization IPv4 IPv6
External (VLAN) Internal (VNIC)

Database Virtualization

Planned Changes Project Changes Operational Chages

Storage Services

Network Services
Network Segmentation Authoritative Time Source

Mobile Device Virtualization

Policies and Standards


Operational Security Baselines Job Aid Guidelines Role Based Awareness Best Practices & Regulatory correlation Information Security Policies Technical Security Standards Data/Asset Classification

OS VIrtualization

TPM Virtualization

Virtual Memory

Smartcard Virtualization

Co-Chairs: Jairo Orea, Yaron Levi, Dan Logan. Team: Richard Austin, Frank Simorjay, Yaron Levi, Jon-Michael Brook, Jarrod Stenberg, Ken Trant, Earle Humphreys, Vern Williams Date: 02/25/2013

You might also like