Campbell (2015) outlines a scenario that I think more organizations are faced with, yet take somewhat for granted. We routinely setup systems with a production, test and development environment and most of the time our test environment nearly mirrors our production environment for load testing, disaster recovery testing and because we want things to match. Below is an excerpt from one of the Western Australia's Office for the Auditor General's report.

We are in the same boat as the statement above when it comes to maintain the same strict controls across all environments. We have outlined this as a security risk and we have started to address it. When it comes to our financial and HR systems we mask any personal identifiable information. We try to maintain a subset of information in those non-production systems if possible. We are now requiring individual access requests for those environment and requiring approval of those requests from system owner.
We certainly have a long way to go to do this across to board. However, I think we have identified a risk and are working to mitigate it.
Campbell (2015) goes on to state, "A security architect will understand the complicated tensions between the business, policy, cost and delivery, and ensures the security of systems being delivered are never compromised for the sake of making delivery easier or getting into production quicker." It is important to have someone reviewing security from the beginning of a system installation to make sure it can or will adhere to the policies at hand. We try to have most application reviewed from a SOX perspective even if they are not a SOX application because at any point they could become one. This allows us to make sure we have things like separation of duties, user access reviews and sensitive data reviews.
In all it is going to important to start including Security architecture in the overall Enterprise Architecture practice.
Reference
Campbell, Tony (2015). Why you need to build security architecture into your enterprise. Retrieved October 20th, 2016 from http://www.itnews.com.au/blogentry/why-you-need-to-build-security-architecture-into-your-enterprise-411592
Adaptive Security Architecture
I found an interesting post that touched on a bit more detail around adaptive security architecture and gave a couple area to focus on. Amrutha (2016) provides two blog post touching on adaptive security architecture. In the first Amrutha (2016) states "The adaptive security architecture can help enterprises shift their existing mind-set of “incident response,” wherein incidents are thought of as occasional, one-off events, to a mind-set of continuous response, where they assume that cyber-attacks are relentless and hackers have the ability to continuously penetrate the systems." This is an interesting statement and I think makes you open your eyes a bit if you are not directly involved with security practices.
Amrutha (2016) goes on to quote the Gartner report, "Designing an Adaptive Security Architecture for Protection from Advanced Attacks," which outlines four, high-level categories of competence.
Most organization today continue to invest mainly in prevention-only security techniques.
The advanced security capabilities from different vendors are not integrated appropriately.
Traditional monitoring practices are becoming increasingly insufficient.
Most organizations have many blind spots while implementing incident response techniques.
Amrutha (2016) talks about moving away from prevention-only techniques and making sure you start to focus on detection, response and prediction capabilities. I know we have started to move way from just prevention. It seems like as soon as you can come to terms with the idea, "that you will never keep hackers out," the sooner you can move on to the next three areas.
He also talks about context-aware security, this is an interesting area that I want to follow up with our security group on. It seems like it could help increase the likely hood of preventing unauthorized access.
He continues to talk about increased levels of monitoring across all layers of the IT stack. This is sometimes difficult given vendor solutions. Not all vendors have build in or are concerned about monitoring their own environments as we would like them to be. We tend to just shake our heads and move on but from what Amrutha (2016) is talking about we need to start focusing on it more.
Overall, I need to get a better understanding of our currently security procedures and how we are implementing the four high-level categories of competence.
References
Aprameya, Amrutha (2016). Enhacing IT security with adaptive security architecture - part 1. Retrieved October 20th, 2016 from https://blogs.manageengine.com/it-security/2016/04/07/enhancing-it-security-with-adaptive-security-architecture-part-1.html
Aprameya, Amrutha (2016). Enhacing IT security with adaptive security architecture - part 2. Retrieved October 20th, 2016 from https://blogs.manageengine.com/it-security/2016/04/14/enhancing-it-security-with-adaptive-security-architecture-part-2.html
Risk Based Security Analysis
I was looking for more information on risk based security analysis and ran across the Crowther (2015) article. It was interesting because it established a base for risk and security. Crowther (2015) uses references to define risk as:
Crowther (2015) goes on to talk about some false presumptions about risk management and security analysis. They are as follows:
Reference
Crowther, Dr. Kenneth G. (2015). Do you want risk-based security analysis or security risk analysis? Retrieved October 21, 2016 from http://www.innovativedecisions.com/blog/2015/9/25/do-you-want-risk-based-security-analysis-or-security-risk-analysis
Campbell (2015) goes on to state, "A security architect will understand the complicated tensions between the business, policy, cost and delivery, and ensures the security of systems being delivered are never compromised for the sake of making delivery easier or getting into production quicker." It is important to have someone reviewing security from the beginning of a system installation to make sure it can or will adhere to the policies at hand. We try to have most application reviewed from a SOX perspective even if they are not a SOX application because at any point they could become one. This allows us to make sure we have things like separation of duties, user access reviews and sensitive data reviews.
In all it is going to important to start including Security architecture in the overall Enterprise Architecture practice.
Reference
Campbell, Tony (2015). Why you need to build security architecture into your enterprise. Retrieved October 20th, 2016 from http://www.itnews.com.au/blogentry/why-you-need-to-build-security-architecture-into-your-enterprise-411592
Adaptive Security Architecture
I found an interesting post that touched on a bit more detail around adaptive security architecture and gave a couple area to focus on. Amrutha (2016) provides two blog post touching on adaptive security architecture. In the first Amrutha (2016) states "The adaptive security architecture can help enterprises shift their existing mind-set of “incident response,” wherein incidents are thought of as occasional, one-off events, to a mind-set of continuous response, where they assume that cyber-attacks are relentless and hackers have the ability to continuously penetrate the systems." This is an interesting statement and I think makes you open your eyes a bit if you are not directly involved with security practices.
Amrutha (2016) goes on to quote the Gartner report, "Designing an Adaptive Security Architecture for Protection from Advanced Attacks," which outlines four, high-level categories of competence.
- “Preventive” capabilities are the preventive policies, products, and processes that are put in place to counter attacks. The key goal of this category is to raise the bar for attackers by reducing the surface area for attacks before these attacks can affect the entire enterprise.
- “Detective” capabilities are designed to discover attacks that evade the preventive category. The key goal behind this category is to reduce the dwell time for threat detection and therefore prevent potential damages from becoming actual damages.
- “Retrospective” capabilities are required to drill down and remediate issues discovered by detective activities (or by outside security services) and to provide forensic insights and root cause analysis. Retrospective proficiencies can be used to recommend new preventive measures to avoid future incidents.
- “Predictive” capabilities enable the security team to learn about and record external events via external monitoring of the hacker activities to proactively anticipate new attack types against the current systems. This intelligence is later used as feedback into the preventive and detective capabilities, thus closing the loop on the entire set of adaptive security capabilities.
Most organization today continue to invest mainly in prevention-only security techniques.
The advanced security capabilities from different vendors are not integrated appropriately.
Traditional monitoring practices are becoming increasingly insufficient.
Most organizations have many blind spots while implementing incident response techniques.
Amrutha (2016) talks about moving away from prevention-only techniques and making sure you start to focus on detection, response and prediction capabilities. I know we have started to move way from just prevention. It seems like as soon as you can come to terms with the idea, "that you will never keep hackers out," the sooner you can move on to the next three areas.
He also talks about context-aware security, this is an interesting area that I want to follow up with our security group on. It seems like it could help increase the likely hood of preventing unauthorized access.
He continues to talk about increased levels of monitoring across all layers of the IT stack. This is sometimes difficult given vendor solutions. Not all vendors have build in or are concerned about monitoring their own environments as we would like them to be. We tend to just shake our heads and move on but from what Amrutha (2016) is talking about we need to start focusing on it more.
Overall, I need to get a better understanding of our currently security procedures and how we are implementing the four high-level categories of competence.
References
Aprameya, Amrutha (2016). Enhacing IT security with adaptive security architecture - part 1. Retrieved October 20th, 2016 from https://blogs.manageengine.com/it-security/2016/04/07/enhancing-it-security-with-adaptive-security-architecture-part-1.html
Aprameya, Amrutha (2016). Enhacing IT security with adaptive security architecture - part 2. Retrieved October 20th, 2016 from https://blogs.manageengine.com/it-security/2016/04/14/enhancing-it-security-with-adaptive-security-architecture-part-2.html
Risk Based Security Analysis
I was looking for more information on risk based security analysis and ran across the Crowther (2015) article. It was interesting because it established a base for risk and security. Crowther (2015) uses references to define risk as:
- Risk is the study of future bad events.
- Risk is the study of future events that have uncertainty or unknown/ambiguous precursors or consequences.
- Risk is the study of how bad the consequences of the bad events could get.
- Security is concerned with preserving the value of an asset (or operation).
- Security is concerned with threats that might undermine the asset value.
- Security is concerned with the actions and responsibilities of a protector.
Crowther (2015) goes on to talk about some false presumptions about risk management and security analysis. They are as follows:
- Risk analysis won’t make countermeasure recommendations.
- There is not “a single, accepted risk assessment methodology.
- Traditional risk analysis cannot help you identify unimagined, emergent threats and hazards.
- Risk analysis does not lend itself to naive data science.
Reference
Crowther, Dr. Kenneth G. (2015). Do you want risk-based security analysis or security risk analysis? Retrieved October 21, 2016 from http://www.innovativedecisions.com/blog/2015/9/25/do-you-want-risk-based-security-analysis-or-security-risk-analysis