0% found this document useful (0 votes)
97 views5 pages

Running Head: Security Architecture Development Process 1

The document outlines a proposed security architecture development process for Sudo DevTeam based on the SABSA framework. It begins by mapping the company's business drivers to control objectives. It then evaluates the current inadequate state of security and proposes an ideal "honeycomb and concentric egg" security domain model. It stresses the importance of documenting security lifetimes and policies. An entity model with unique identifiers and an explicit trust framework are suggested to define relationships. Finally, the strategy of layered "defense in depth" security is presented to cover weaknesses and protect data according to network restrictions.

Uploaded by

api-526409506
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views5 pages

Running Head: Security Architecture Development Process 1

The document outlines a proposed security architecture development process for Sudo DevTeam based on the SABSA framework. It begins by mapping the company's business drivers to control objectives. It then evaluates the current inadequate state of security and proposes an ideal "honeycomb and concentric egg" security domain model. It stresses the importance of documenting security lifetimes and policies. An entity model with unique identifiers and an explicit trust framework are suggested to define relationships. Finally, the strategy of layered "defense in depth" security is presented to cover weaknesses and protect data according to network restrictions.

Uploaded by

api-526409506
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Running head: Security Architecture Development Process 1

SABSA-Based Security Architecture Development Process

G. Logan Gombar

University of San Diego

Ms. Michelle Moore


Security Architecture Development Process 2

SABSA-Based Security Architecture Development Process

Driver - Control Objective Mapping

The company (Sudo DevTeam) has the following business drivers that map to a given set

of control objectives, shown in Table 1.

ID BD1 BD2 BD3 BD4 BD5


Competitor Customer
Business Driver Policy Litigation Resource prices
Activities demands
Providing return on
Business Attributes Compliance Legal Cost-effective Responsive
investment
Business Comply with Take advantage of Respond in real-
Avoid litigation Reduce costs
Requirement policy competitor missteps time
The company
Non-compliance Costs rise too Become non-
High Level Threat Litigation delays responses
breaks trust high competitive
to customers
Company loses Company pushed
Business Impact Customers leave Customers leave Customers leave
money out of the market
Impact Value H H H H H
Inadequate
Not following Lack of
Potential High- Over-priced Competitors gain response times
policy breaches oversight ends
level Vuln purchases advantage frustrate
trust in legal action
customers
Green Field Vuln
H H H H H
Value
Green Field Risk A A A A A
Implementing
Adding competitor
predictable,
Implementing Onboarding a analysis process and
Adding market achievable
policy review legal team market analysis
High-Level Control research process service level
process results results in process increase
Objectives results in agreements
in compliance reduced return on
reduced costs results in
litigation investment across
satisfied, return
the board
customers
Table 1: Business Driver to High-Level Control Objective Matrix
Security Architecture Development Process 3

Current State of Security

The current state of security for Sudo DevTeam is inadequate, at best. The De-Militarized

Zone that houses the internet-facing webpages doesn’t have the proper access lists and allows for

connections to the internal network. The VPN architecture has not been properly integrated with

Public Key Infrastructure best practices. There are no control review processes and the policies

that would enable secure operations are not in place. The desired end-goal of implementing the

Principle of Least Privilege on the financial servers has not been accomplished. All of these

together are indicative of the abysmal current state of security.

Security Domain Model

The ideal security domain model for the Sudo DevTeam company would be the

honeycomb and concentric egg model, sitting in line with the recommendation of the Enterprise

Security Architecture book (Sherwood, 2005). This is the ideal architecture as it allows for high

security while also allowing a large degree of flexibility.

Security Lifetimes & Deadlines

Security lifetimes and registration requirements being detailed and documented is a

highly integral requirement. Specifically, tracking licensing lifetimes and security certificate

registration timelines will enable financial stability and consistent security coverage through the

consistently upkept lifetimes of these documents. Additionally, the expiration and recreation

registration of passwords and tokens for the network should be tracked and documented to

ensure they are changed over at appropriate times. This will enable greater operational capability.

Extrapolating further on this, policies should have lifetimes as well. Regular review and

updating of security policies is required to ensure the ecosystem is kept healthy and secure.
Security Architecture Development Process 4

Implementing these review processes will keep the ecosystem abreast of any upcoming and new

threats, as well as bringing in new and improved security tactics and techniques.

Entity Model Naming & Trust Framework

To ensure explicit security, a defined trust framework needs to be implemented. A key

step in doing this is to generate a standard format to ensure explicitly unique identifiers for each

and every device and element in the enterprise. Doing this enables the creation of the requisite

trust framework. Creating this trust framework requires definition of the expectations and

assumptions of each step of each process and interaction between every element in every

network. This explicit statement of trust is crucial to the honeycomb and egg structure described

before as it will be what enables that framework. Every relationship provides an implicit level of

trust outright and the explicit statement of it ensure the proper documentation (Sherwood, 2005).

Naming each element in an easily definable and describable manner will enable the creation of

this flexible and powerful framework.

Security Strategies & Architecture Layering

The overarching, desired security strategy for Sudo DevTeam is the idea of defense in

depth, or “multi-layered security”. Defense in depth is the idea of layering multiple security

tactics and techniques that could and should cover the weaknesses in one another (Forcepoint,

2020). This style of security would be applied at each level of the honeycomb/egg architecture to

help work towards a network architecture that is powerful, flexible, and secure. This becomes a

reality as the layers of defenses become more restrictive as the network level becomes more

confidential – the most private data is protected the most, where the working environment is

flexible enough to enable operations.


Security Architecture Development Process 5

References

Forcepoint. (2020, March 24). What is defense in depth? [Link]

depth

Sherwood, J. (2005). Enterprise security architecture: A business-driven approach. CRC Press.

You might also like