SlideShare une entreprise Scribd logo
1  sur  11
Service Oriented Security Engineering Richard Veryard
Security Is Sometimes Seen As A Challenge And Inhibitor For Enterprise SOA My product will make SOA safe. Is SOA safe? You can afford it. How much does it cost?
Decision Problems If I go ahead with this innovation, does it introduce new security risks and requirements? Should I abandon or postpone this innovation until the security issues are completely resolved? Risk Assessment How can I assemble a collection of security mechanisms and standards from different sources? Would I be better off acquiring everything from a single source? Integration Interoperability Should I adopt this standard, or insist that my suppliers conform to this standard? What does adoption entail? Standards How can I justify a given level of expenditure in security? How can I assess whether I am getting value-for-money from my investment in security? Business Case Do I need this class of security product? If so, how do I choose between the competing products in this class? What is a reasonable cost for this kind of product (direct and indirect)? Evaluation Comment Security Decision
Process Problems Disconnect between Functional Requirements and Non-Functional Requirements Disconnect between Business-Level and Detailed Security Requirements Piecemeal tool-driven approach to security No systematic business case for security. Tendency towards Cost-Avoidance rather than Risk/Reward Non-Functional Requirements as Afterthought
Why Security Doesn’t Remain Stationary Absolute Security My security is unaffected by what anyone else does. Relative Security I have to maintain at least as much security as everyone else. Innovation by other potential targets Innovation by attackers Responsive Security My security must respond to innovation by attackers. Agile Security My security should stay one step ahead of the game.
Layered Security Architecture (extract) Domain Services Stand-Alone Security Services Security in Platform Capability Services Business Transaction Risk and Compliance
Model-View-Controller Domain Services Security Services Security in Platform Capability Services Model View Controller
Multiple Entry Points Security Assessment Reviewing the levels of security contained in existing systems and artifacts (including models and plans) Security Implementation Implementing and activating a complete and consistent set of security policies and mechanisms Security Requirements Modeling the business and its ecosystem to determine detailed requirements and opportunities for (greater) security. Security Architecture Producing plans and portfolios that integrate security with other desired characteristics, including agility.
Security Lifecycle Runs Parallel with Service Engineering Lifecycle ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How the Security Schema follows a Generic Business Schema What the attacker does attack capability attack opportunity attack goal What the defender does defensive capability defensive action threat security goal What the business does capability response (unit of work) event outcome (goal) anti-requirements requirements generic schema
If you were intrigued by this presentation … ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.cbdiforum.com

Contenu connexe

Tendances

CISO Platform Security Maturity Model
CISO Platform Security Maturity ModelCISO Platform Security Maturity Model
CISO Platform Security Maturity ModelPriyanka Aash
 
Network Security Expert and Risk Analyst
Network Security Expert and Risk AnalystNetwork Security Expert and Risk Analyst
Network Security Expert and Risk AnalystAshok K DL
 
6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling MisconceptionsCigital
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
Cyber Threat Modeling
Cyber Threat ModelingCyber Threat Modeling
Cyber Threat ModelingEC-Council
 
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...Siemplify
 
Mcs2453 aniq mc101053-assignment2
Mcs2453 aniq mc101053-assignment2Mcs2453 aniq mc101053-assignment2
Mcs2453 aniq mc101053-assignment2Aniq Eastrarulkhair
 
Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...
Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...
Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...aaronabrahhaam
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...XEventsHospitality
 
Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...
Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...
Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...avengersendgame208
 
Requirements-Driven Mediation for Collaborative Security
Requirements-Driven Mediation for Collaborative SecurityRequirements-Driven Mediation for Collaborative Security
Requirements-Driven Mediation for Collaborative SecurityAmel Bennaceur
 

Tendances (13)

CISO Platform Security Maturity Model
CISO Platform Security Maturity ModelCISO Platform Security Maturity Model
CISO Platform Security Maturity Model
 
Network Security Expert and Risk Analyst
Network Security Expert and Risk AnalystNetwork Security Expert and Risk Analyst
Network Security Expert and Risk Analyst
 
6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Cyber Threat Modeling
Cyber Threat ModelingCyber Threat Modeling
Cyber Threat Modeling
 
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
 
Mcs2453 aniq mc101053-assignment2
Mcs2453 aniq mc101053-assignment2Mcs2453 aniq mc101053-assignment2
Mcs2453 aniq mc101053-assignment2
 
Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...
Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...
Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
 
Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...
Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...
Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...
 
Requirements-Driven Mediation for Collaborative Security
Requirements-Driven Mediation for Collaborative SecurityRequirements-Driven Mediation for Collaborative Security
Requirements-Driven Mediation for Collaborative Security
 
penetration test
penetration testpenetration test
penetration test
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 

En vedette

Brand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBrand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBilcareltd
 
Serenity Project: Security in Software Enginering
Serenity Project: Security in Software EngineringSerenity Project: Security in Software Enginering
Serenity Project: Security in Software EngineringFrancisco Sanchez Cid
 
Software Engineering and Information Security
Software Engineering and Information SecuritySoftware Engineering and Information Security
Software Engineering and Information SecurityMassimo Felici
 
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C. Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C. Amazon Web Services
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringaizazhussain234
 
Testing Types and Paradigms - 2015-07-13 - V11
Testing Types and Paradigms - 2015-07-13 - V11Testing Types and Paradigms - 2015-07-13 - V11
Testing Types and Paradigms - 2015-07-13 - V11Donald Firesmith
 
CNIT 121: 16 Report Writing
CNIT 121: 16 Report WritingCNIT 121: 16 Report Writing
CNIT 121: 16 Report WritingSam Bowne
 
Engineering Safety and Security-Related Requirements
Engineering Safety and Security-Related RequirementsEngineering Safety and Security-Related Requirements
Engineering Safety and Security-Related RequirementsDonald Firesmith
 

En vedette (20)

Brand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBrand Protection & Security of Engineering Components
Brand Protection & Security of Engineering Components
 
Serenity Project: Security in Software Enginering
Serenity Project: Security in Software EngineringSerenity Project: Security in Software Enginering
Serenity Project: Security in Software Enginering
 
Ch20 systems of systems
Ch20 systems of systemsCh20 systems of systems
Ch20 systems of systems
 
Software Engineering and Information Security
Software Engineering and Information SecuritySoftware Engineering and Information Security
Software Engineering and Information Security
 
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C. Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
 
Ch13 security engineering
Ch13 security engineeringCh13 security engineering
Ch13 security engineering
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Ch22 project management
Ch22 project managementCh22 project management
Ch22 project management
 
Ch23 project planning
Ch23 project planningCh23 project planning
Ch23 project planning
 
Testing Types and Paradigms - 2015-07-13 - V11
Testing Types and Paradigms - 2015-07-13 - V11Testing Types and Paradigms - 2015-07-13 - V11
Testing Types and Paradigms - 2015-07-13 - V11
 
CNIT 121: 16 Report Writing
CNIT 121: 16 Report WritingCNIT 121: 16 Report Writing
CNIT 121: 16 Report Writing
 
Ch10 dependable systems
Ch10 dependable systemsCh10 dependable systems
Ch10 dependable systems
 
Ch21 real time software engineering
Ch21 real time software engineeringCh21 real time software engineering
Ch21 real time software engineering
 
Ch14 resilience engineering
Ch14 resilience engineeringCh14 resilience engineering
Ch14 resilience engineering
 
Ch18 service oriented software engineering
Ch18 service oriented software engineeringCh18 service oriented software engineering
Ch18 service oriented software engineering
 
Ch9 evolution
Ch9 evolutionCh9 evolution
Ch9 evolution
 
Engineering Safety and Security-Related Requirements
Engineering Safety and Security-Related RequirementsEngineering Safety and Security-Related Requirements
Engineering Safety and Security-Related Requirements
 
Ch24 quality management
Ch24 quality managementCh24 quality management
Ch24 quality management
 
Ch17 distributed software engineering
Ch17 distributed software engineeringCh17 distributed software engineering
Ch17 distributed software engineering
 
Ch19 systems engineering
Ch19 systems engineeringCh19 systems engineering
Ch19 systems engineering
 

Similaire à Service-Oriented Security Engineering

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architectureangelohammond
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworksJohn Arnold
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfParishSummer
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security ManagementNick Krym
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCruzIbarra161
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 
Cloud Adoption Framework Secure Overview
Cloud Adoption Framework Secure OverviewCloud Adoption Framework Secure Overview
Cloud Adoption Framework Secure OverviewAanSulistiyo
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxMark Simos
 
Open group spc rosenthal v3
Open group   spc rosenthal v3Open group   spc rosenthal v3
Open group spc rosenthal v3City of Toronto
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution SecurityAlan McSweeney
 
Secure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.pptSecure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.pptNeha Sharma
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsPECB
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security InitiativesMarco Morana
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011dma1965
 
Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architectureMubashirAslam5
 
Evolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIsEvolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIsDinis Cruz
 

Similaire à Service-Oriented Security Engineering (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architecture
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
ESA for Business
ESA for BusinessESA for Business
ESA for Business
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security Management
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Se project-methodology-for-security-project-web
Se project-methodology-for-security-project-webSe project-methodology-for-security-project-web
Se project-methodology-for-security-project-web
 
Cloud Adoption Framework Secure Overview
Cloud Adoption Framework Secure OverviewCloud Adoption Framework Secure Overview
Cloud Adoption Framework Secure Overview
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 
Open group spc rosenthal v3
Open group   spc rosenthal v3Open group   spc rosenthal v3
Open group spc rosenthal v3
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution Security
 
Secure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.pptSecure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.ppt
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile Environments
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security Initiatives
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architecture
 
Evolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIsEvolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIs
 

Plus de Richard Veryard

The New Economics of Manufacturing
The New Economics of ManufacturingThe New Economics of Manufacturing
The New Economics of ManufacturingRichard Veryard
 
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPRDigital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPRRichard Veryard
 
Real-Time Personalization
Real-Time PersonalizationReal-Time Personalization
Real-Time PersonalizationRichard Veryard
 
Customer Engagement Open Group Oct 2015
Customer Engagement Open Group Oct 2015Customer Engagement Open Group Oct 2015
Customer Engagement Open Group Oct 2015Richard Veryard
 
EA Second Coming EA Forum Nov 2014
EA Second Coming EA Forum Nov 2014EA Second Coming EA Forum Nov 2014
EA Second Coming EA Forum Nov 2014Richard Veryard
 
What can Enterprise Architecture learn from Systems Thinking?
What can Enterprise Architecture learn from Systems Thinking?What can Enterprise Architecture learn from Systems Thinking?
What can Enterprise Architecture learn from Systems Thinking?Richard Veryard
 
Architecting multi sided business 2
Architecting multi sided business 2Architecting multi sided business 2
Architecting multi sided business 2Richard Veryard
 
Perspectives on Enterprise Architecture and Systems Thinking
Perspectives on Enterprise Architecture and Systems ThinkingPerspectives on Enterprise Architecture and Systems Thinking
Perspectives on Enterprise Architecture and Systems ThinkingRichard Veryard
 
Enterprise Architecture on Trial
Enterprise Architecture on TrialEnterprise Architecture on Trial
Enterprise Architecture on TrialRichard Veryard
 
Why do I need to understand business?
Why do I need to understand business?Why do I need to understand business?
Why do I need to understand business?Richard Veryard
 
Business Architecture - The Rise and Fall of Smart Retail
Business Architecture - The Rise and Fall of Smart RetailBusiness Architecture - The Rise and Fall of Smart Retail
Business Architecture - The Rise and Fall of Smart RetailRichard Veryard
 
Six views of business architecture
Six views of business architectureSix views of business architecture
Six views of business architectureRichard Veryard
 
Assessing Org Intelligence
Assessing Org IntelligenceAssessing Org Intelligence
Assessing Org IntelligenceRichard Veryard
 
Architecture led procurement
Architecture led procurementArchitecture led procurement
Architecture led procurementRichard Veryard
 
Architecting multi sided business
Architecting multi sided businessArchitecting multi sided business
Architecting multi sided businessRichard Veryard
 
Next Generation Enterprise Architecture
Next Generation Enterprise ArchitectureNext Generation Enterprise Architecture
Next Generation Enterprise ArchitectureRichard Veryard
 

Plus de Richard Veryard (20)

IOT is coming to town
IOT is coming to townIOT is coming to town
IOT is coming to town
 
The New Economics of Manufacturing
The New Economics of ManufacturingThe New Economics of Manufacturing
The New Economics of Manufacturing
 
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPRDigital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
 
Real-Time Personalization
Real-Time PersonalizationReal-Time Personalization
Real-Time Personalization
 
Customer Engagement Open Group Oct 2015
Customer Engagement Open Group Oct 2015Customer Engagement Open Group Oct 2015
Customer Engagement Open Group Oct 2015
 
EA Second Coming EA Forum Nov 2014
EA Second Coming EA Forum Nov 2014EA Second Coming EA Forum Nov 2014
EA Second Coming EA Forum Nov 2014
 
On Customer Insight
On Customer InsightOn Customer Insight
On Customer Insight
 
What can Enterprise Architecture learn from Systems Thinking?
What can Enterprise Architecture learn from Systems Thinking?What can Enterprise Architecture learn from Systems Thinking?
What can Enterprise Architecture learn from Systems Thinking?
 
Architecting multi sided business 2
Architecting multi sided business 2Architecting multi sided business 2
Architecting multi sided business 2
 
Perspectives on Enterprise Architecture and Systems Thinking
Perspectives on Enterprise Architecture and Systems ThinkingPerspectives on Enterprise Architecture and Systems Thinking
Perspectives on Enterprise Architecture and Systems Thinking
 
Enterprise Architecture on Trial
Enterprise Architecture on TrialEnterprise Architecture on Trial
Enterprise Architecture on Trial
 
Why do I need to understand business?
Why do I need to understand business?Why do I need to understand business?
Why do I need to understand business?
 
Business Architecture - The Rise and Fall of Smart Retail
Business Architecture - The Rise and Fall of Smart RetailBusiness Architecture - The Rise and Fall of Smart Retail
Business Architecture - The Rise and Fall of Smart Retail
 
Implementation Roadmap
Implementation RoadmapImplementation Roadmap
Implementation Roadmap
 
Six views of business architecture
Six views of business architectureSix views of business architecture
Six views of business architecture
 
Assessing Org Intelligence
Assessing Org IntelligenceAssessing Org Intelligence
Assessing Org Intelligence
 
Architecture led procurement
Architecture led procurementArchitecture led procurement
Architecture led procurement
 
Architecting multi sided business
Architecting multi sided businessArchitecting multi sided business
Architecting multi sided business
 
Next Generation Enterprise Architecture
Next Generation Enterprise ArchitectureNext Generation Enterprise Architecture
Next Generation Enterprise Architecture
 
Notes on Coupling
Notes on CouplingNotes on Coupling
Notes on Coupling
 

Dernier

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Dernier (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Service-Oriented Security Engineering

  • 1. Service Oriented Security Engineering Richard Veryard
  • 2. Security Is Sometimes Seen As A Challenge And Inhibitor For Enterprise SOA My product will make SOA safe. Is SOA safe? You can afford it. How much does it cost?
  • 3. Decision Problems If I go ahead with this innovation, does it introduce new security risks and requirements? Should I abandon or postpone this innovation until the security issues are completely resolved? Risk Assessment How can I assemble a collection of security mechanisms and standards from different sources? Would I be better off acquiring everything from a single source? Integration Interoperability Should I adopt this standard, or insist that my suppliers conform to this standard? What does adoption entail? Standards How can I justify a given level of expenditure in security? How can I assess whether I am getting value-for-money from my investment in security? Business Case Do I need this class of security product? If so, how do I choose between the competing products in this class? What is a reasonable cost for this kind of product (direct and indirect)? Evaluation Comment Security Decision
  • 4. Process Problems Disconnect between Functional Requirements and Non-Functional Requirements Disconnect between Business-Level and Detailed Security Requirements Piecemeal tool-driven approach to security No systematic business case for security. Tendency towards Cost-Avoidance rather than Risk/Reward Non-Functional Requirements as Afterthought
  • 5. Why Security Doesn’t Remain Stationary Absolute Security My security is unaffected by what anyone else does. Relative Security I have to maintain at least as much security as everyone else. Innovation by other potential targets Innovation by attackers Responsive Security My security must respond to innovation by attackers. Agile Security My security should stay one step ahead of the game.
  • 6. Layered Security Architecture (extract) Domain Services Stand-Alone Security Services Security in Platform Capability Services Business Transaction Risk and Compliance
  • 7. Model-View-Controller Domain Services Security Services Security in Platform Capability Services Model View Controller
  • 8. Multiple Entry Points Security Assessment Reviewing the levels of security contained in existing systems and artifacts (including models and plans) Security Implementation Implementing and activating a complete and consistent set of security policies and mechanisms Security Requirements Modeling the business and its ecosystem to determine detailed requirements and opportunities for (greater) security. Security Architecture Producing plans and portfolios that integrate security with other desired characteristics, including agility.
  • 9.
  • 10. How the Security Schema follows a Generic Business Schema What the attacker does attack capability attack opportunity attack goal What the defender does defensive capability defensive action threat security goal What the business does capability response (unit of work) event outcome (goal) anti-requirements requirements generic schema
  • 11.