application security architecture: timing & requirements

25
Application Security Architecture: Timing & Requirements – Getting It Right and On Time Brian V. Cummings [email protected] Tata Consultancy Services Thursday, March 15, 2012 Session 10187

Upload: others

Post on 19-May-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Application Security Architecture: Timing & Requirements

Application Security Architecture: Timing & Requirements – Getting It Right and On Time

Brian V. Cummings

[email protected]

Tata Consultancy Services

Thursday, March 15, 2012

Session 10187

Page 2: Application Security Architecture: Timing & Requirements

Why?

1

Security is to Application Development

as Truth is to a Court of Law:

It is usually the last thing to come to the room, and has to be

dragged in by its heels, kicking and screaming in protest!

Lawyer whose name I have long forgotten

Page 3: Application Security Architecture: Timing & Requirements

Often a Thorny, Unresolved Issue

2

Page 4: Application Security Architecture: Timing & Requirements

3

A recent (horror) Story

Query from a Project Lead:

Lead: “Brian, when is the best time in a development project to

talk to Security?”

Brian (to self): OMG!!!

Brian (to Lead): What are you building and how far along are

you.

Lead: A Procurement Web Portal for the company’s vendors.

We begin testing in a few weeks.

Brian (to Lead): The answer is “At the start of the project!”

The one that finally prompted this presentation

Page 5: Application Security Architecture: Timing & Requirements

Another Recent Story

4

Request from a Project Lead:

Lead: “Brian, we are going live with this Web Portal in three

months. We need you to help us document security and

disaster recovery procedures”

Brian: What security and disaster recovery provisions have

been made?

Lead: Not much, but we need the procedures!

Brian (to Lead): The answer is “At the start of the project!”

They simply don’t know how much they don’t know!

Page 6: Application Security Architecture: Timing & Requirements

Still Another Recent Story

5

Dismissal from a Project Lead:

Security Architect to Lead: “What provisions are you making

for security? How can I help you? We need to make sure

your security architecture is consistent with our standards.

Lead to Security Architect: “We believe we can implement this

Web Portal with a minimum of security. You don’t need to

worry about it!”

(The above in one of the world’s

largest financial institutions).

What? Me? Worry?

Really?

Page 7: Application Security Architecture: Timing & Requirements

Outsourcing your Application Development?

6

Quality Assessor to Project Lead:

Quality Guy: “Who from the client is engaged in coordinating their

requirements for risk, security, compliance, and continuity?

Lead to Quality Guy “Umm…they have not been involved.”

Quality Guy: “Did we seek them out and they declined? Did they

seek us out and we declined?”

Lead: “Umm, no, neither.”

What’s wrong with this

picture?

Page 8: Application Security Architecture: Timing & Requirements

The End Result (Just Desserts)

7

Cost and/or Vulnerability

and/or Growth

Limitations

Incompatible Architecture

Inadequate Security

Need to Retrofit

Page 9: Application Security Architecture: Timing & Requirements

OK, Wiseguy…What’s the Answer?

8

Page 10: Application Security Architecture: Timing & Requirements

1. Frameworks & Standards

9

http://pubs.opengroup.org/architecture/togaf8-doc/arch/ http://www.sabsa-institute.org/home.aspx

Foundations

Secure App Dev

Framework

(SABSA)

Architecture Framework

(TOGAF)

Site Relevant Secure App

Dev Standards

Page 11: Application Security Architecture: Timing & Requirements

1A. TOGAF Security Architecture

10

Authentication & Authorization

Risk Management, Assurance, Audit

Asset Protection

Availability

Administration

Page 12: Application Security Architecture: Timing & Requirements

1A1. TOGAF Security Architecture Phases

11

Business

Requirements

Architecture

Vision

Business

Architecture

Information

Systems

Architecture

Technology

Architecture

Opportunities

& Solutions

Migration

Planning

Implementation

Governance

Architecture

Change

Management

Page 13: Application Security Architecture: Timing & Requirements

1B. SABSA Secure Application Development

12

Page 14: Application Security Architecture: Timing & Requirements

1B1. SABSA Security Matrix

13

Page 15: Application Security Architecture: Timing & Requirements

1C1. Site Relevant Process & Standards

14

Page 16: Application Security Architecture: Timing & Requirements

1C2. Site Relevant Process & Standards

15

Page 17: Application Security Architecture: Timing & Requirements

2. Security Architecture Governance

16

Security Governance

IT Risk/Compliance Management

Enterprise Security Architecture

Application Security CoE

Security Assessment / Compliance Audit

Training & Awareness

Process Excellence

Architectural Review/Guidance

Thought Leadership / Direction

Compliance Assurance

Page 18: Application Security Architecture: Timing & Requirements

3. Application Security Risk Management

17

Page 19: Application Security Architecture: Timing & Requirements

3a. Application Security Risk Management

18

Risk Tier Applicability Security

Extreme Risk

Internet facing transactional

applications, especially of a

financial nature.

Strongest identification,

authentication, access

control, PKI encryption vs

SSL, storage encryption.

Continuous vulnerability

testing.

High Risk Applications that handle financial

data; privacy regulated data;

intellectual property; company

sensitive or restricted data.

Internet facing or not.

Strong identity

authentication, access

control, SSL, storage

encryption, and standard

vulnerability testing.

Moderate Risk

Other core business applications;

non-transactional Internet facing

apps

Baseline security controls

Low Risk All others Baseline security controls

Page 20: Application Security Architecture: Timing & Requirements

4. Application Project Security Architects

19

Page 21: Application Security Architecture: Timing & Requirements

4a. A More Whimsical Diagram

20

Page 22: Application Security Architecture: Timing & Requirements

5. Security Architect as a Consultant

21

Do This! Not This!

Page 23: Application Security Architecture: Timing & Requirements

The CISO’s Challenge

22

Business Enablement InfoRisk/Security Effectiveness

CISO

Value Proposition

Optimize Risk & Security Investment• Balance investment to risk

• Increase capacity and coverage with current staff

• Increase quality of security management

• Reduce relative Security TCO

Achieving “Secure” Business Success & ProfitabilityAchieving “Secure” Business Success & ProfitabilityAchieving “Secure” Business Success & ProfitabilityAchieving “Secure” Business Success & Profitability

Increase employee and enterprise

productivity and time to market• Automated Identity & Access

• Role-Based Access

• Automated monitoring and alerts

• Automated compliance validation

• Facilitate business agility

Optimize Information risk and

security programs• Alignment with business environment

and business goals and objectives

• Vision and strategy aligned with risk

• Solutions balanced across risks and

investment focused on greatest risks

Balancing Protection, Compliance, Enablement, Productivity, Profitability

Few endeavors in an enterprise can enable or impair its mission to the extent as can its information risk and security program.

Page 24: Application Security Architecture: Timing & Requirements

Summary of Better Practices for Application Security Architecture

23

Adopt the TOGAF and SABSA frameworks

Establish IT Security Architecture Governance

Establish Application Risk Management

Require Project Security Architects

Be a Consultant, not an Enforcer

Page 25: Application Security Architecture: Timing & Requirements

The End! Thank you!

24

The Minions of Despicable Me