SlideShare a Scribd company logo
Security Verified




                         Security Architecture Framework




Mohamed Ridha Chebbi, CISSP
iCode InfoSec – CEO & Head of PS
ridha.chebbi@icodesecurity.com

                                   © 2012 iCode information security All rights reserved
Agenda                                                                      Security Verified




     Introduction
     Approach to Develop Security Architecture
     Information Security Concepts
     Security Architecture Levels & Viewpoints
     Technical Viewpoint
     Information Viewpoint
     Business Viewpoint
     Security Architecture Framework
     iCode Professional Services




                    © 2012 iCode information security All rights reserved
Introduction                                                                    Security Verified




There are a Number of Approaches to Develop a Security Architecture Like :
    1. As a DOMAIN in the TECHNICAL ARCHITECTURE
    2. As TOTALLY SEPARATE Security Architecture ViewPoint

Security is Pervasive across all of Architecture impacting :
- Business
- Information
- and Technology




                        © 2012 iCode information security All rights reserved
Approach to Develop Security Architecture                                                                 Security Verified




                                                                      Architecture
                  Information
                  Security :
                  . Data Security                                                          Architecture
                    Requirements                     Solutions &
 Business
                  . Data Classification                Security
                  . Application Security             Architecture
                    Standard                                                         Architecture
 Security :               Technology
 . Business Security
   Requirements
 . Security Organization Security :
 . Security Policy       . Technology
   Framework                Security
 . Process Security        Requirements
                         . Security Principles
                         . Security Patterns
                         . Security Services
                         . Security Bricks




                             © 2012 iCode information security All rights reserved
Information Security Concepts                                                                                             Security Verified




                                                                             Digital Signatures
                 Encryption
                                                                                                         Authentication
                                                                                                            Verifies
                                                                                                           identities
                              Confidentiality                                         Integrity
                               only authorized                                      Data has not been
                                  disclosure                                            changed
                Isolation                                 Information                               Data Validation
                                                            System
                                                                                                Data Hashing




    Core Concept                                                                 Resilient Designs
                                                         Availability
                                                        Data has not been
   Related Concept                                          changed
                                            Utility                             Service Level
    Technique                             Usefulness                            Agreements
                                           of data




                                    © 2012 iCode information security All rights reserved
iCode Security Architecture Framework
                                                                                              Security Verified




                                                          Vision
                                                  Security Services
                                                    Framework




                                                Design Principles




                                            Requirement Templates




         Business                             Information                         Technical
         Viewpoint                            Viewpoint                           Viewpoint
                          © 2012 iCode information security All rights reserved
Technical Viewpoint
                                                                                                              Security Verified




                                                      Vision
                                              Security Services
                                                Framework


                                                                 .Trust Levels
                                                                   .Conceptual
                                                                     Technology
                                                                       Models
                                            Design Principles
                                                                          .Logical Technology
                                                                              Models
                                                                              .Trust Models

                                        Requirement Templates
                                                                               . Technical Reference Models
                                                                                  .Security Infrastructure
                                                                                    Architecture
                                                                                    .Security Services Architecture
                                                                                     .Application Security Architecture


                                                                                              Technical
                                                                                              Viewpoint
                      © 2012 iCode information security All rights reserved
Information Viewpoint
                                                                                Security Verified




                                                        Vision
                                                Security Services
                                                  Framework

                                                    . Policy
                                                  Framework
                                                . Information
                                                Classification
                                                 Framework
                                              Design Principles
                                          . Security Information
                                               Flow Models
                                                . SLA Model
                                          Requirement Templates

                                 . Security Information Architecture
                                . Information Classification Register
                                                    . SLA’s



                                            Information
                                            Viewpoint
                        © 2012 iCode information security All rights reserved
Business Viewpoint
                                                                                       Security Verified




                                                               Vision
                                                       Security Services
                                                         Framework

                                            .Process
                                            Models
                                        .Roles &
                                    Responsibi-
                                  lities Models
                                                  Design Principles

                         .Organization
                         Models

                                                 Requirement Templates

             .Organizational
             Architecture




         Business
         Viewpoint
                               © 2012 iCode information security All rights reserved
Global Security Architecture Framework                                                                              Security Verified




                                                              Vision
                                                       Security Services
                                                         Framework

                                            .Process . Policy .Trust Levels
                                            Models Framework
                                        .Roles & . Information .Conceptual
                                    Responsibi- Classification Technology
                                  lities Models     Framework       Models
                                                  Design Principles
                                                 . Security Information           .Logical Technology
                          .Organization               Flow Models                     Models
                          Models
                                                       . SLA Model                      .Trust Models

                                                Requirement Templates

              .Organizational           . Security Information Architecture . Technical Reference Models
                                                                               .Security Infrastructure
              Architecture             . Information Classification Register     Architecture
                                                        . SLA’s                  .Security Services Architecture
                                                                                  .Application Security Architecture


          Business                                 Information                                          Technical
          Viewpoint                                Viewpoint                                            Viewpoint
                                © 2012 iCode information security All rights reserved
iCode Professional Services for Tunisiana                                      Security Verified




                       © 2012 iCode information security All rights reserved
Security Verified




                             Thanks




Mohamed Ridha Chebbi, CISSP
iCode InfoSec – CEO & Head of PS
ridha.chebbi@icodesecurity.com

                                   © 2012 iCode information security All rights reserved
Ad

More Related Content

What's hot (20)

SABSA Implementation(Part III)_ver1-0
SABSA Implementation(Part III)_ver1-0SABSA Implementation(Part III)_ver1-0
SABSA Implementation(Part III)_ver1-0
Maganathin Veeraragaloo
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of Security
Sounil Yu
 
SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0
Maganathin Veeraragaloo
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes Profiling
SABSAcourses
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
Capgemini
 
Using the Threat Agent Library to improve threat modeling
Using the Threat Agent Library to improve threat modelingUsing the Threat Agent Library to improve threat modeling
Using the Threat Agent Library to improve threat modeling
Eric Jernigan MSIA, CISSP, CISM, CRISC
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
Priyanka Aash
 
Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
Industrial_Cyber_Security
Industrial_Cyber_SecurityIndustrial_Cyber_Security
Industrial_Cyber_Security
WillianMachadoFonsec
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
WoMaster
 
Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modeling
sedukull
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
John Arnold
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
 
Cyber security career development paths
Cyber security career development pathsCyber security career development paths
Cyber security career development paths
Chelsea Jarvie
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of Security
Sounil Yu
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes Profiling
SABSAcourses
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
Capgemini
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
Priyanka Aash
 
Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
WoMaster
 
Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modeling
sedukull
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
John Arnold
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
 
Cyber security career development paths
Cyber security career development pathsCyber security career development paths
Cyber security career development paths
Chelsea Jarvie
 

Viewers also liked (19)

Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
New Horizons Bulgaria
 
Dasar keselamatan ict_ukas
Dasar keselamatan ict_ukasDasar keselamatan ict_ukas
Dasar keselamatan ict_ukas
Syaliza Razak
 
SmartUnity Building Automation System
SmartUnity Building Automation SystemSmartUnity Building Automation System
SmartUnity Building Automation System
Vitaly Fedorov
 
Building Automation: The scope for energy and CO2 savings
Building Automation: The scope for energy and CO2 savingsBuilding Automation: The scope for energy and CO2 savings
Building Automation: The scope for energy and CO2 savings
Leonardo ENERGY
 
Isu dan cabaran dunia
Isu dan cabaran duniaIsu dan cabaran dunia
Isu dan cabaran dunia
Aidil Syazwan
 
Internet of Things in Scandinavia - society and ecosystem for early adaptation
Internet of Things in Scandinavia - society and ecosystem for early adaptationInternet of Things in Scandinavia - society and ecosystem for early adaptation
Internet of Things in Scandinavia - society and ecosystem for early adaptation
Josef Noll
 
20170201 RILHEVA RENEWABLES IoT PLATFORM
20170201 RILHEVA RENEWABLES IoT PLATFORM20170201 RILHEVA RENEWABLES IoT PLATFORM
20170201 RILHEVA RENEWABLES IoT PLATFORM
Massimiliano Cravedi
 
iot building automation
iot building automationiot building automation
iot building automation
Our Point
 
Strategic Management Unit I&II
Strategic Management Unit I&IIStrategic Management Unit I&II
Strategic Management Unit I&II
Carmel EM High School Chebrole
 
Business Values for IoT Solutions
Business Values for IoT SolutionsBusiness Values for IoT Solutions
Business Values for IoT Solutions
IBM Analytics
 
Iot data analytics
Iot data analyticsIot data analytics
Iot data analytics
Unmesh Ballal
 
Why and-how-to-choose-an-iot-platforms-201701
Why and-how-to-choose-an-iot-platforms-201701Why and-how-to-choose-an-iot-platforms-201701
Why and-how-to-choose-an-iot-platforms-201701
Omar Nawaz
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
rbrockway
 
Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...
Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...
Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...
McKenney's Inc
 
InduSoft Building Automation and Energy Management Webinar
InduSoft Building Automation and Energy Management WebinarInduSoft Building Automation and Energy Management Webinar
InduSoft Building Automation and Energy Management Webinar
AVEVA
 
Bpp 602 security and safety addministration
Bpp 602 security and safety addministrationBpp 602 security and safety addministration
Bpp 602 security and safety addministration
Kamizatul Liyana
 
20170101 RILHEVA HVAC IOT PLATFORM
20170101 RILHEVA HVAC IOT PLATFORM20170101 RILHEVA HVAC IOT PLATFORM
20170101 RILHEVA HVAC IOT PLATFORM
Massimiliano Cravedi
 
2014 pt3 21_sejarah
2014 pt3 21_sejarah2014 pt3 21_sejarah
2014 pt3 21_sejarah
Sarvess Peace
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
New Horizons Bulgaria
 
Dasar keselamatan ict_ukas
Dasar keselamatan ict_ukasDasar keselamatan ict_ukas
Dasar keselamatan ict_ukas
Syaliza Razak
 
SmartUnity Building Automation System
SmartUnity Building Automation SystemSmartUnity Building Automation System
SmartUnity Building Automation System
Vitaly Fedorov
 
Building Automation: The scope for energy and CO2 savings
Building Automation: The scope for energy and CO2 savingsBuilding Automation: The scope for energy and CO2 savings
Building Automation: The scope for energy and CO2 savings
Leonardo ENERGY
 
Isu dan cabaran dunia
Isu dan cabaran duniaIsu dan cabaran dunia
Isu dan cabaran dunia
Aidil Syazwan
 
Internet of Things in Scandinavia - society and ecosystem for early adaptation
Internet of Things in Scandinavia - society and ecosystem for early adaptationInternet of Things in Scandinavia - society and ecosystem for early adaptation
Internet of Things in Scandinavia - society and ecosystem for early adaptation
Josef Noll
 
20170201 RILHEVA RENEWABLES IoT PLATFORM
20170201 RILHEVA RENEWABLES IoT PLATFORM20170201 RILHEVA RENEWABLES IoT PLATFORM
20170201 RILHEVA RENEWABLES IoT PLATFORM
Massimiliano Cravedi
 
iot building automation
iot building automationiot building automation
iot building automation
Our Point
 
Business Values for IoT Solutions
Business Values for IoT SolutionsBusiness Values for IoT Solutions
Business Values for IoT Solutions
IBM Analytics
 
Why and-how-to-choose-an-iot-platforms-201701
Why and-how-to-choose-an-iot-platforms-201701Why and-how-to-choose-an-iot-platforms-201701
Why and-how-to-choose-an-iot-platforms-201701
Omar Nawaz
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
rbrockway
 
Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...
Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...
Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...
McKenney's Inc
 
InduSoft Building Automation and Energy Management Webinar
InduSoft Building Automation and Energy Management WebinarInduSoft Building Automation and Energy Management Webinar
InduSoft Building Automation and Energy Management Webinar
AVEVA
 
Bpp 602 security and safety addministration
Bpp 602 security and safety addministrationBpp 602 security and safety addministration
Bpp 602 security and safety addministration
Kamizatul Liyana
 
20170101 RILHEVA HVAC IOT PLATFORM
20170101 RILHEVA HVAC IOT PLATFORM20170101 RILHEVA HVAC IOT PLATFORM
20170101 RILHEVA HVAC IOT PLATFORM
Massimiliano Cravedi
 
Ad

Similar to iCode Security Architecture Framework (20)

Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
Vladimir Jirasek
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Craig Martin
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
Bob Rhubart
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
Vladimir Jirasek
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft Private Cloud
 
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
IBMSSA
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
IDBI Intech
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
IntelAPAC
 
Dataplex Company Overview
Dataplex Company OverviewDataplex Company Overview
Dataplex Company Overview
dataplex systems limited
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
VSD infotech
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
IBM Sverige
 
Hacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking ServicesHacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking Services
Carlo Pelliccioni, CISSP
 
Hacktive Security - IT Security Services
Hacktive Security - IT Security ServicesHacktive Security - IT Security Services
Hacktive Security - IT Security Services
Francesco Mormile
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
n|u - The Open Security Community
 
Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]
ISS
 
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
IBM Sverige
 
E-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real WorldE-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real World
Chris Byrne
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
Mahmoud Moustafa
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT Security
Seccuris Inc.
 
Future Focus Infotech
Future Focus InfotechFuture Focus Infotech
Future Focus Infotech
Lyf Ffi
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
Vladimir Jirasek
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Craig Martin
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
Bob Rhubart
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
Vladimir Jirasek
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft Private Cloud
 
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
IBMSSA
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
IDBI Intech
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
IntelAPAC
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
IBM Sverige
 
Hacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking ServicesHacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking Services
Carlo Pelliccioni, CISSP
 
Hacktive Security - IT Security Services
Hacktive Security - IT Security ServicesHacktive Security - IT Security Services
Hacktive Security - IT Security Services
Francesco Mormile
 
Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]
ISS
 
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
IBM Sverige
 
E-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real WorldE-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real World
Chris Byrne
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
Mahmoud Moustafa
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT Security
Seccuris Inc.
 
Future Focus Infotech
Future Focus InfotechFuture Focus Infotech
Future Focus Infotech
Lyf Ffi
 
Ad

iCode Security Architecture Framework

  • 1. Security Verified Security Architecture Framework Mohamed Ridha Chebbi, CISSP iCode InfoSec – CEO & Head of PS [email protected] © 2012 iCode information security All rights reserved
  • 2. Agenda Security Verified Introduction Approach to Develop Security Architecture Information Security Concepts Security Architecture Levels & Viewpoints Technical Viewpoint Information Viewpoint Business Viewpoint Security Architecture Framework iCode Professional Services © 2012 iCode information security All rights reserved
  • 3. Introduction Security Verified There are a Number of Approaches to Develop a Security Architecture Like : 1. As a DOMAIN in the TECHNICAL ARCHITECTURE 2. As TOTALLY SEPARATE Security Architecture ViewPoint Security is Pervasive across all of Architecture impacting : - Business - Information - and Technology © 2012 iCode information security All rights reserved
  • 4. Approach to Develop Security Architecture Security Verified Architecture Information Security : . Data Security Architecture Requirements Solutions & Business . Data Classification Security . Application Security Architecture Standard Architecture Security : Technology . Business Security Requirements . Security Organization Security : . Security Policy . Technology Framework Security . Process Security Requirements . Security Principles . Security Patterns . Security Services . Security Bricks © 2012 iCode information security All rights reserved
  • 5. Information Security Concepts Security Verified Digital Signatures Encryption Authentication Verifies identities Confidentiality Integrity only authorized Data has not been disclosure changed Isolation Information Data Validation System Data Hashing Core Concept Resilient Designs Availability Data has not been Related Concept changed Utility Service Level Technique Usefulness Agreements of data © 2012 iCode information security All rights reserved
  • 6. iCode Security Architecture Framework Security Verified Vision Security Services Framework Design Principles Requirement Templates Business Information Technical Viewpoint Viewpoint Viewpoint © 2012 iCode information security All rights reserved
  • 7. Technical Viewpoint Security Verified Vision Security Services Framework .Trust Levels .Conceptual Technology Models Design Principles .Logical Technology Models .Trust Models Requirement Templates . Technical Reference Models .Security Infrastructure Architecture .Security Services Architecture .Application Security Architecture Technical Viewpoint © 2012 iCode information security All rights reserved
  • 8. Information Viewpoint Security Verified Vision Security Services Framework . Policy Framework . Information Classification Framework Design Principles . Security Information Flow Models . SLA Model Requirement Templates . Security Information Architecture . Information Classification Register . SLA’s Information Viewpoint © 2012 iCode information security All rights reserved
  • 9. Business Viewpoint Security Verified Vision Security Services Framework .Process Models .Roles & Responsibi- lities Models Design Principles .Organization Models Requirement Templates .Organizational Architecture Business Viewpoint © 2012 iCode information security All rights reserved
  • 10. Global Security Architecture Framework Security Verified Vision Security Services Framework .Process . Policy .Trust Levels Models Framework .Roles & . Information .Conceptual Responsibi- Classification Technology lities Models Framework Models Design Principles . Security Information .Logical Technology .Organization Flow Models Models Models . SLA Model .Trust Models Requirement Templates .Organizational . Security Information Architecture . Technical Reference Models .Security Infrastructure Architecture . Information Classification Register Architecture . SLA’s .Security Services Architecture .Application Security Architecture Business Information Technical Viewpoint Viewpoint Viewpoint © 2012 iCode information security All rights reserved
  • 11. iCode Professional Services for Tunisiana Security Verified © 2012 iCode information security All rights reserved
  • 12. Security Verified Thanks Mohamed Ridha Chebbi, CISSP iCode InfoSec – CEO & Head of PS [email protected] © 2012 iCode information security All rights reserved