Variables Storage, Type, Declaration.

Security and EA
A Thread Relevant to all Levels of
the EA Cube
Copyright © 2013 Curt Hill
Introduction
• EA Security has a broader
perspective than IT security
– EA Security include IT security
• It needs to be considered at every
level
• IT security typically lives in the
Applications and Systems as well as
the Network and Infrastructure
levels
• You should have previously seen
something on IT security
Copyright © 2013 Curt Hill
Types of Threats
• Physical threats
– Fire, flood, earthquake, etc
• Personal threats
– Unhappy employees, hackers,
terrorists
• Accidents
– Programming errors, unintentional
mistakes
Copyright © 2013 Curt Hill
Dangers
• The insider attack is particularly
deadly for the insider knows the
defense
• It is impossible to completely secure
the enterprise from all threats
– Typically too expensive
• Instead we must always balance
probability and cost of a risk with
the expense to defend against the
risk
Copyright © 2013 Curt Hill
Where to start?
• Historically, security is an
afterthought
– After we get burned, we make sure we
do not get burned again
• Enterprises now live in a world of
forest fires
– It is not a question of if a problem will
occur, but when
• Therefore security should be
considered in every project
– From the very beginning
– Demand security content in every
Copyright © 2013 Curt Hill
IT Security Program
• Every enterprise that can afford an
Enterprise Architecture program
needs an IT Security Program
• This includes one or more IT
professionals with IT security
training and experience
• They are involved in every IT project
in at least a consulting role
• The also advise the EA team on
security considerations
Copyright © 2013 Curt Hill
Security Program
• For each project (proposed or
existing) they
– Describe the threats and their sources
– Possible countermeasures
• They also produce Standard
Operating Procedures
– To certify IT projects
– Run existing installations
– Respond to incidents
Copyright © 2013 Curt Hill
IT Security Plan
• A guide discussing the security for
the enterprise
• Produced by the Security Program
• Has a number of sections that
address various groups within the
enterprise
– Executives
– Operations
• It contains:
– How to report incidents
– Standard Operating Procedures
Copyright © 2013 Curt Hill
– Threats
Areas of Interest
• The Security Program needs to deal
specifically with the following areas
of interest
–
–
–
–
Information security
Personnel security
Operational security
Physical security
• These are now considered in more
detail
Copyright © 2013 Curt Hill
Information security
• Design
– Projects must be required to have a
reasonable security element
• Assurance
– The quality of data must be protected
from unauthorized or accidental
change
• Authentication
– Data changes must be verified to
prevent incorrect access
• Access
– Ability to control who views and uses
Copyright © 2013 Curt Hill
Personnel security
• Authentication – users and
administrators must be verified
– What form must this take
• Security Training – Users must be
informed about security issues
• Procedures – What is the proper
way to use and access the system
– How to recognize, avoid and report
breaches
Copyright © 2013 Curt Hill
Operational security
• Risk assessment
– From highest to lowest levels of the
cube
• Component evaluation
– Component testing for vulnerabilities
• Remediation
– Patching vulnerabilities found by
evaluation
• Certification
– A process to verify that components
have fixed all known vulnerabilities
Copyright © 2013 Curt Hill
Operational security
• Standard Operating Procedures
– Those involved in operations must be
familiar with SOP
• Recovery
– Assessing and recovering from events
that disrupt operations
• Operational continuity
– After serious damage has occurred,
how operations would be restored
Copyright © 2013 Curt Hill
Physical security
• Building security
– Any room where the access is better
than from the internet
• Server rooms and network closets
– Protecting areas of particular
sensitivity
– A network closet is particularly
vulnerable and seldom visited
• Cabling
– Like a network closet, they are easy to
tap and seldom observed
Copyright © 2013 Curt Hill
Your Turn
• What sort of attacks would be
easiest at VCSU?
• What is the likelihood of such
attacks?
– What would an attacker gain?
Copyright © 2013 Curt Hill
Conclusions
• The reason we have an IT security
problem is that we have
underestimated the danger
• Prudent management requires
consideration of security at all levels
• The identification and mitigation of
threats is the task of those properly
trained
Copyright © 2013 Curt Hill