-
21. Security Architecture and the ADM
21.1 Overview
The goal of this chapter is to explain the security considerations that need to be addressed during application of the TOGAF Architecture Development Method (ADM).
21.2 Introduction
Architecture development using the ADM is iterative in nature, as many areas of concern are revisited but at a finer-grained level of examination. Through the several phases the reader might see topics repeated, or in an earlier phase a topic might be treated at a higher level than the reader might expect. Architecture development methods are also tools in the hands of the practitioner to be used as best fits the practitioner's experience. The guidance included here is intended to help practitioners avoid missing a critical security concern. It is expected that elements included by the authors in specific phases will be modified and shifted according to the practitioner's experience.
This chapter is not intended to be a security architecture development methodology. It is intended for the enterprise architect deploying the TOGAF ADM, to inform the enterprise architect of what the security architect will need to carry out their security architecture work. It is also intended as a guide to help the enterprise architect avoid missing a critical security concern.
Discussion of security architecture has the tension of being separate from the remainder of enterprise architecture development and at the same time needing to be fully integrated in it. The focus of the security architect is enforcement of security policies of the enterprise, which at times can be seen as inhibiting advancement of projects undertaken by the enterprise architect and application development team. Security architects spend a good deal of effort proving the negative.
Security architectures generally have the following characteristics:
- Security architecture has its own methods. These methods might be the basis for a discreet security methodology.
- Security architecture composes its own discrete view and viewpoints.
- Security architecture addresses non-normative flows through systems and among applications.
- Security architecture introduces its own normative flows through systems and among applications.
- Security architecture introduces unique, single-purpose components in the design.
- Security architecture calls for its own unique set of skill requirements in the IT architect.
21.3 Guidance on Security for the Architecture Domains
Pervasively throughout the architecture domains and in all phases of the architecture development, security concerns of the enterprise need to be accounted for. Security is called out separately because it is infrastructure that is rarely visible to the business function being added to the Target Architecture to derive value. Its fundamental purpose is to protect the value of the systems and information assets of the enterprise. The nature of security in the enterprise is that it is deemed successful if nothing happens that is visible to the user or other observer, and no damage or losses occur. That is, if the enterprise retains the use and value of its information assets, the goals of security in the enterprise have been met. These assets might be obvious - like the data in a customer records database - or intangible - like not having the company name appear in an article in the news saying that its data systems had been compromised.
While security architecture does have its own single-purpose components, security is experienced as a quality of systems in the architecture. The Enterprise Security view of the architecture calls out its own unique building blocks, collaborations, and interfaces. These security-unique elements must interface with the business systems in a balanced and cost-effective way, so as to maintain the security policies of the enterprise, but not interfere with system operations and functions. It is least costly and most effective to plan for and implement security-specific functions in the Target Architecture as early as possible in the development cycle to avoid costly retrofit or rework because required building blocks for security were not added or used during systems development and deployment. The approach of the IT architect operating in the security domain is also different from IT architects operating in other architecture domains. The security architect considers not only the normal flow of the application, but also the abnormal flows, failure modes, and ways the systems and applications can be interrupted. Put differently, the IT architect tends to focus mostly on how a system will work, while the security architect focuses primarily on how the system might fail.
All groups of stakeholders in the enterprise will have security concerns. These concerns might not be obvious as security-related concerns unless there is special awareness on the part of the IT architect. It is desirable to bring a security architect into the project as early as possible. Throughout the phases of the ADM, guidance will be offered on security-specific information which should be gathered, steps which should be taken, and artifacts which should be created. Architecture decisions related to security, like all others, should be traceable to business and policy decisions, which should derive from a risk analysis. The generally accepted areas of concern for the security architect are:
- Authentication: The substantiation of the identity of a person or entity related to the system in some way.
- Authorization: The definition and enforcement of permitted capabilities for a person or entity whose identity has been established.
- Audit: The ability to provide forensic data attesting that the system was used in accordance with stated security policies.
- Assurance: The ability to test and prove that the system has the security attributes required to uphold the stated security policies.
- Availability: The ability of the system to function without service interruption or depletion despite abnormal or malicious events.
- Asset Protection: The protection of information assets from loss or unintended disclosure, and resources from unauthorized and unintended use.
- Administration: The ability to add and change security policies, add or change how policies are implemented in the system, and add or change the persons or entities related to the system.
- Risk Management: The organization's attitude and tolerance for risk. (This risk management is different from the special definition found in financial markets and insurance institutions that have formal risk management departments.)
Typical security architecture artifacts would include:
- Business rules regarding handling of data/information assets
- Written and published security policy
- Codified data/information asset ownership and custody
- Risk analysis documentation
- Data classification policy documentation
21.4 ADM Architecture Requirements Management
The security policy and security standards become part of the enterprise requirements management process. Security policy is established at an executive level of the business, is long-lived, and resistant to whimsical change. Security policy is not tied to any specific technology. Once the security policies are established, they can be referred to as requirements for all architecture projects.
Security standards change more frequently and state technology preferences used to support security policies. New technologies that support the implementation of security policies in a better way can be adopted as needed. The improvements can be in reduced costs or increased benefits. Security standards will manifest themselves as security-related building blocks in the Enterprise Continuum. Security patterns for deploying these security-related building blocks are referred to in the Security Guidance to Phase E.
New security requirements arise from many sources:
- A new statutory or regulatory mandate
- A new threat realized or experienced
- A new IT architecture initiative discovers new stakeholders and/or new requirements
In the case where 1. and 2. above occur, these new requirements would be drivers for input to the change management system discussed in Phase H. A new architecture initiative might be launched to examine the existing infrastructure and applications to determine the extent of changes required to meet the new demands. In the case of 3. above, a new security requirement will enter the requirements management system.
Is our security good?
This question inevitably comes from management to the security architect. No security measures are ever perfect, and the potential exists for the amount of money and effort expended to become very large for little additional return. Security assurance testing should be in place so that the security systems can be measured to ensure that they keep the security policies for which they were designed. Security policy audits should be held and might be mandatory by statute or regulation. These security audits and possible security policy changes are the exact reason why separation of policy enforcement from application code is so strongly emphasized.
Nothing useful can be said about a security measure outside the context of an application, or a system and its environment
The efficacy of a security measure is considered in relation to the risk it mitigates. An enterprise cannot determine how much it will be willing to spend on securing an asset until it understands the asset value. For example, the use of that asset in an application and the concomitant risk the asset is exposed to as a result, will determine the true requirements for security. Additionally, the organization's tolerance for risk is a factor. In other words, the question asked should not be: "Is it secure?" but rather: "Is it secure enough?" The latter is ultimately a question to be answered by risk analysis.
21.5 Preliminary Phase
Define and document applicable regulatory and security policy requirements
The framework and principles rarely change, and so the security implications called out in the objectives of this phase should be fairly straightforward. A written security policy for the organization must be in place, and there should be regular notification and education established for employees. ISO/IEC 17799:2005 is a good place to start the formation of a security policy, and can be used to assess the security readiness of an organization. Without a written and published security policy, enforcement is difficult. Security policies refer to many aspects of security for the organization - such as physical premises security - that are remotely related to security of systems and applications. The security policy should be examined to find relevant sections, and updated if necessary. Architecture constraints established in the security policy must be communicated to the other members of the architecture team.
In a similar fashion, there may be regulatory requirements that specify obligations the system must fulfil or actions that must be taken. Whether the system will be subject to regulation will depend upon the functionality of the system and the data collected or maintained. In addition, the jurisdiction where the system or service is deployed, where the users reside, or under which the deploying entity is chartered or incorporated will inform this decision. It may be wise to obtain legal counsel regarding these obligations at the outset of activities.
Identify a security architect or security architecture team
Agreement on the role of the security architect in the enterprise architecture process and in the architecture and IT governance should also be established. Security considerations can conflict with functional considerations and a security advocate is required to ensure that all issues are addressed and conflicts of interest do not prevent explicit consideration of difficult issues. Executive policy decisions should be established at this point about what security policies can be negotiable and which policies must be enforced for regulatory or statutory reasons.
Identify first-order assumptions and boundary conditions
If the business model of the organization does encompass federation with other organizations, the extent of the security federation should be established at this point in the process. Contractual federation agreements should be examined for their security implications and agreements. It may be necessary to establish joint architecture meetings with other members of a federation to establish interfaces and protocols for exchange of security information related to federated identity, authentication, and authorization.
21.5.1 Security Inputs
- Written security policy
- Relevant statutes
- List of applicable jurisdictions
21.5.2 Security Outputs
- List of applicable regulations
- List of applicable security policies
- Security team roster
- List of security assumptions and boundary conditions
21.6 Phase A: Architecture Vision
Definition of relevant stakeholders and discovery of their concerns and objectives will require development of a high-level scenario. Key business requirements will also be established through this early scenario work. The TOGAF ADM business scenario process may be useful here and at later stages.
Obtain management support for security measures
In similar fashion to obtaining management recognition and endorsement for the overall architecture project, so too endorsement of the security-related aspects of the architecture development effort should be obtained. Recognition that the project might have development and infrastructure impact that are not readily visible by looking solely at the systems in question should be made clear. Thorough consideration and mitigation of issues related to risk and security may be perceived as a waste of resources and time; the level of management support must be understood and communicated throughout the team.
Define necessary security-related management sign-off milestones of this architecture development cycle
The traceability of security-related architecture decisions should be documented and the appropriate executives and line management who need to be informed of security-related aspects of the project need to be identified and the frequency of reporting should be established. It should be recognized that the tension between delivery of new business function and enforcement of security policies does exist, and that a process for resolving such disputes that arise should be established early in the project. Such tensions often have the result of putting the security architect seemingly "in the way of completing the project". It needs to be understood by management and the other architects involved that the role of the security architect is to safeguard the assets of the enterprise.
Determine and document applicable disaster recovery or business continuity plans/requirements
Any existing disaster recovery and business continuity plans must be understood and their relationship with the planned system defined and documented.
Identify and document the anticipated physical/business/regulatory environment(s) in which the system(s) will be deployed
All architecture decisions must be made within the context of the environments within which the system will be placed and operate. Physical environments that should be documented may include battlefield environments, commercial environments, outdoor environments, mobile environments, and the like. In a similar fashion, the business environment must be defined. Potential business environments may include different assumptions regarding users and interfaces, and those users or interfaces may carry the onus of regulatory environments in which the system must operate (users under the age of thirteen in the US, for example).
Determine and document the criticality of the system: safety-critical/mission-critical/non-critical
Safety-critical systems place lives in danger in case of failure or malfunction.
Mission-critical systems place money, market share, or capital at risk in case of failure.
Non-critical systems have little or no consequence in case of failure.
21.6.1 Security Inputs
- List of applicable security policies
- List of applicable jurisdictions
- Complete disaster recovery and business continuity plans
21.6.2 Security Outputs
- Physical security environment statement
- Business security environment statement
- Regulatory environment statement
- Security policy cover letter signed by CEO or delegate
- List of architecture development checkpoints for security sign-off
- List of applicable disaster recovery and business continuity plans
- Systems criticality statement
21.7 Phase B: Business Architecture
Determine who are the legitimate actors who will interact with the product/service/process
Development of the business scenarios and subsequent high-level use-cases of the project concerned will bring to attention the people actors and system actors involved. Many subsequent decisions regarding authorization will rely upon a strong understanding of the intended users, administrators, and operators of the system, in addition to their expected capabilities and characteristics. It must be borne in mind that users may not be humans; software applications may be legitimate users. Those tending to administrative needs, such as backup operators, must also be identified, as must users outside boundaries of trust, such as Internet-based customers.
Assess and baseline current security-specific business processes (enhancement of existing objective)
The business process regarding how actors are vetted as proper users of the system should be documented. Consideration should also be made for actors from outside the organization who are proper users of the system. The outside entities will be determined from the high-level scenarios developed as part of Phase A.
Determine whom/how much it is acceptable to inconvenience in utilizing security measures
Security measures, while important, can impose burden on users and administrative personnel. Some will respond to that burden by finding ways to circumvent the measures. Examples include administrators finding ways to create "back doors" or customers choosing a competitor to avoid the perceived burden of the infrastructure. The trade-offs can require balancing security advantages against business advantages and demand informed judicious choice.
Identify and document interconnecting systems beyond project control
Every cybernetic or business system must rely upon existing systems beyond the control of the project. These systems possess advantages and disadvantages, risks and benefits. Examples include the Domain Name System (DNS) that resolves computer and service names to Internet addresses, or paper currency issued by the local treasury. The address returned by the host or service DNS may not always be trustworthy; paper currency may not always be genuine, and recourse will vary in efficacy between jurisdictions. These interfaces must be understood and documented.
Determine the assets at risk if something goes wrong - "What are we trying to protect?"
Assets are not always tangible and are not always easy to quantify. Examples include: loss of life, loss of customer good will, loss of a AAA bond rating, loss of market share.
Determine the cost (both qualitative and quantitative) of asset loss/impact in failure cases
It must be remembered that those assets most challenging to quantify can be the most valuable and must not be neglected. Even qualitative estimates will prove valuable in assessing comparative risks.
Identify and document the ownership of assets
Assets may be owned by outside entities, or by inside entities. Inside entities may be owned by individuals or by organizations. Determine:
- Where trust is assumed
- How it is established
- How it is communicated
Always trace it to the real world; i.e.:
- Assessment (credit searches, personal vouching)
- Liability (monetary damages, jail terms, sanctions)
All security decisions rely upon trust that has been established in some fashion. No trust assumptions have any value if they cannot be rooted in real-world assessment and liability. In most business environments, trust is established through contracts that define liability where the trust is breached. The onus for assessing trust is the responsibility of those choosing to enter into the contracts and their legal counsel. It is important to note that technology (e.g., digital certificates, SAML, etc.) cannot create trust, but can only convey in the electronic world the trust that already exists in the real world through business relationships, legal agreements, and security policy consistencies.
Determine and document appropriate security forensic processes
To be able to enforce security policies, breaches of security need to be properly captured so that problem determination and possible policy or legal action can be taken against the entity causing the breach. Forensic practices suitable to provide evidence where necessary need to be established and documented. Security personnel should be trained to follow the forensic procedures and training material regarding the need to collect evidence should be considered for the standard security education given to employees.
Identify the criticality of the availability and correct operation of the overall service
The risks associated with loss of availability may have already been adequately considered in the foregoing mission-critical/safety-critical assessment.
Determine and document how much security (cost) is justified by the threats and the value of the assets at risk
A risk analysis (an understanding of the value of assets at risk and the likelihood of potential threats) provides an important guideline for investments in mitigation strategies for the identified threats.
Reassess and confirm Architecture Vision decisions
Business analysis involves a number of rigorous thought exercises and may call into question the initial assumptions identified in the Architecture Vision.
Assess alignment or conflict of identified security policies with business goals
The security policies identified in the Preliminary phase may have provisions that are difficult or impossible to reconcile with the business goals in light of the identified risks. Possible responses include alteration of aspects of the business environment, modification of the intended user population, or technical mitigation of risks (addressed in Phase C).
Determine "what can go wrong?"
Perform a threat analysis that identifies the high-level threats bearing upon the system and their likelihood.
21.7.1 Security Inputs
- Initial business and regulatory security environment statements
- List of applicable disaster recovery and business continuity plans
- List of applicable security policies and regulations
21.7.2 Security Outputs
- List of forensic processes
- List of new disaster recovery and business continuity requirements
- Validated business and regulatory environment statements
- List of validated security policies and regulations
- List of target security processes
- List of baseline security processes
- List of security actors
- List of interconnecting systems
- Statement of security tolerance for each class of security actor
- Asset list with values and owners
- List of trust paths
- Availability impact statement(s)
- Threat analysis matrix
21.8 Phase C: Information Systems Architectures
Assess and baseline current security-specific architecture elements (enhancement of existing objective)
A full inventory of architecture elements that implement security services must be compiled in preparation for a gap analysis.
Identify safe default actions and failure states
Every state change in any system is precipitated by some trigger. Commonly, an enumerated set of expected values of that trigger initiates a change in state. However, there are likely other potential trigger inputs that must be accommodated in non-normative cases. Additionally, system failure may take place at any point in time. Safe default actions and failure modes must be defined for the system informed by the current state, business environment, applicable policies, and regulatory obligations. Safe default modes for an automobile at zero velocity may no longer be applicable at speed. Safe failure states for medical devices will differ markedly from safe failure states for consumer electronics.
Identify and evaluate applicable recognized guidelines and standards
Standards are justly credited for reducing cost, enhancing interoperability, and leveraging innovation. From a security standpoint, standard protocols, standard object libraries, and standard implementations that have been scrutinized by experts in their fields help to ensure that errors do not find their way into implementations. From a security standpoint, errors are security vulnerabilities.
Revisit assumptions regarding interconnecting systems beyond project control
In light of the risk assessments performed, assumptions regarding interconnecting systems may require modification.
Determine and document the sensitivity or classification level of information stored/created/used
Information stored, created, or manipulated by the system may or may not be subject to an official classification that defines its sensitivity and the obligations to which the system and its owners are subject. The absence of any official classification does not necessarily absolve the onus on maintaining the confidentiality of data. Consideration must be made for different legislative burden that may hold jurisdiction over the system and the data stored.
Identify and document custody of assets
All assets of value are kept and maintained on behalf of the owner. The specific persons or organizations charged with this responsibility must be identified.
Identify the criticality of the availability and correct operation of each function
Presumably, in the event of system failure or loss of functionality, some value is lost to stakeholders. The cost of this opportunity loss should be quantified, if possible, and documented.
Determine the relationship of the system under design with existing business disaster/continuity plans
Existing business disaster/continuity plans may accommodate the system under consideration. If not, some analysis is called for to determine the gap and the cost if that gap goes unfilled.
Identify what aspects of the system must be configurable to reflect changes in policy/business environment/access control
No environment is static and systems must evolve to accommodate change. Systems architected for ready reconfiguration will better reflect that change and result in lower cost over the life of the system. Security is enhanced when security-related changes can be implemented inexpensively and are, hence, not sidelined. Security is also enhanced when changes require no changes to code; changes to code introduce bugs and bugs introduce security vulnerabilities.
Identify lifespan of information used as defined by business needs and regulatory requirements
Information maintained beyond its useful lifespan represents wasted resources and, potentially, business decisions based upon suboptimal data. Regulation, however, sometimes mandates the timetable for maintenance of information as archival data.
Determine approaches to address identified risks:
- Mitigate
- Accept
- Transfer
- Avoid
There are several standard ways to address identified and quantified risk. The list above is not intended to be exhaustive for all approaches.
Identify actions/events that warrant logging for later review or triggering forensic processes
Anomalous actions and states will outnumber planned actions and states. These transitions will warrant logging to reconstruct chains of events, facilitate root cause analysis, and, potentially, establish evidence for civil or criminal action. It must be borne in mind that logs must be regularly reviewed to be introduced as evidence into a court of law in some jurisdictions.
Identify and document requirements for rigor in proving accuracy of logged events (non-repudiation)
Since malicious tampering of systems is commonly accompanied by tampering of logged data to thwart investigation and apprehension, the ability to protect and establish the veracity of logs through cryptographic methods will remove uncertainty from investigations and bolster cases in legal proceedings.
Identify potential/likely avenues of attack
Thinking like an adversary will prepare the architect for creation of a robust system that resists malicious tampering and, providentially, malfunction arising from random error.
Determine "what can go wrong?"
21.8.1 Security Inputs
- Threat analysis matrix
- Risk analysis
- Documented forensic processes
- Validated business policies and regulations
- List of interconnecting systems
- New disaster recovery and business continuity requirements
21.8.2 Security Outputs
- Event log-level matrix and requirements
- Risk management strategy
- Data lifecycle definitions
- List of configurable system elements
- Baseline list of security-related elements of the system
- New or augmented security-related elements of the system
- Security use-case models:
- Normative models
- Non-normative models
- List of applicable security standards:
- Protocols
- Object libraries
- Others ...
- Validated interconnected system list
- Information classification report
- List of asset custodians
- Function criticality statement
- Revised disaster recovery and business continuity plans
- Refined threat analysis matrix
21.9 Phase D: Technology Architecture
Assess and baseline current security-specific technologies (enhancement of existing objective)
Revisit assumptions regarding interconnecting systems beyond project control
Identify and evaluate applicable recognized guidelines and standards
Identify methods to regulate consumption of resources
Every system will rely upon resources that may be depleted in cases that may or may not be anticipated at the point of system design. Examples include network bandwidth, battery power, disk space, available memory, and so on. As resources are utilized approaching depletion, functionality may be impaired or may fail altogether. Design steps that identify non-renewable resources, methods that can recognize resource depletion, and measures that can respond through limiting the causative factors, or through limiting the effects of resource depletion to non-critical functionality, can enhance the overall reliability and availability of the system.
Engineer a method by which the efficacy of security measures will be measured and communicated on an ongoing basis
As systems are deployed and operated in dynamic environments, security measures will perform to varying degrees of efficacy as unexpected threats arise and as expected threats change in the environment. A method that facilitates ongoing evaluation of the value of security measures will inform ongoing changes to the system in response to changing user needs, threat patterns, and problems found.
Identify the trust (clearance) level of:
- All users of the system
- All administrators of the system
- All interconnecting systems beyond project control
Regulatory requirements, information classification levels, and business needs of the asset owners will all influence the required level of trust that all interactive entities will be required to fulfil to qualify for access to data or services.
Identify minimal privileges required for any entity to achieve a technical or business objective
Granting sweeping capabilities to any user, application, or other entity can simplify successful transaction completion at the cost of complicating or precluding effective control and audit. Many regulatory obligations are more challenging to demonstrate compliance where privileges are sweeping and controls are loose.
Identify mitigating security measures, where justified by risk assessment
This objective is where the classic security services of identification, authentication, authorization, data confidentiality, data integrity, non-repudiation, assurance, and audit are brought into play, after their applicability is determined and the cost/value of protection has been identified.
Determine "what can go wrong?"
21.9.1 Security Inputs
- List of security-related elements of the system
- List of interconnected systems
- List of applicable security standards
- List of security actors
- Risk management strategy
- Validated security policies
- Validated regulatory requirements
- Validated business policies related to trust requirements
21.9.2 Security Outputs
- Baseline list of security technologies
- Validated interconnected systems list
- Selected security standards list
- Resource conservation plan
- Security metrics and monitoring plan
- User authorization policies
- Risk management plan
- User trust (clearance) requirements
21.10 Phase E: Opportunities & Solutions
Identify existing security services available for re-use
From the Baseline Security Architecture and the Enterprise Continuum, there will be existing security infrastructure and security building blocks that can be applied to the requirements derived from this architecture development engagement. For example, if the requirement exists for application access control external to an application being developed, and such a system already exists, it can be used again. Statutory or regulatory requirements may call for physical separation of domains which may eliminate the ability to re-use existing infrastructure. Known products, tools, building blocks, and patterns can be used, though newly implemented.
Engineer mitigation measures addressing identified risks
Having determined the risks amenable to mitigation and evaluated the appropriate investment in that mitigation as it relates to the assets at risk, those mitigation measures must be designed, implemented, deployed, and/or operated.
Evaluate tested and re-usable security software and security system resources
Since design, code, and configuration errors are the roots of many security vulnerabilities, taking advantage of any problem solutions already engineered, reviewed, tested, and field-proven will reduce security exposure and enhance reliability.
Identify new code/resources/assets that are appropriate for re-use
Having successfully engineered new solutions in the absence of existing re-usable solutions, it is appropriate to evaluate those new solutions for inclusion into any existing libraries, archives, or other repositories for future re-use.
Determine "what can go wrong?"
21.11 Phase F: Migration Planning
Assess the impact of new security measures upon other new components or existing leveraged systems
In a phased implementation the new security components are usually part of the infrastructure in which the new system is implemented. The security infrastructure needs to be in a first or early phase to properly support the project.
Implement assurance methods by which the efficacy of security measures will be measured and communicated on an ongoing basis
During the operational phases, mechanisms are utilized to monitor the performance of many aspects of the system. Its security and availability are no exception.
Identify correct secure installation parameters, initial conditions, and configurations
Security of any system depends not on design and implementation alone, but also upon installation and operational state. These conditions must be defined and monitored not just at deployment, but also throughout operation.
Implement disaster recovery and business continuity plans or modifications
Determine "what can go wrong?"
21.12 Phase G: Implementation Governance
Establish architecture artifact, design, and code reviews and define acceptance criteria for the successful implementation of the findings
Many security vulnerabilities originate as design or code errors and the simplest and least expensive method to locate and find such errors is generally an early review by experienced peers in the craft. Locating such errors, of course, is the first step and implementing corrections at an appropriate point in the development lifecycle is necessary to benefit from the investment. Follow-on inspections or formalized acceptance reviews may be warranted in high-assurance or safety-critical environments.
Implement methods and procedures to review evidence produced by the system that reflects operational stability and adherence to security policies
While planning and specification is necessary for all aspects of a successful enterprise, they are insufficient in the absence of testing and audit to ensure adherence to that planning and specification in both deployment and operation. Among the methods to be exercised are:
- Review system configurations with security impact which can be modified to ensure configuration changes have not compromised security design
- Audit the design, deployment, and operations against security policies
- Audit the design, deployment, and operations against business objectives
- Run test cases against systems to ensure the security systems have been implemented as designed
- Run disaster recovery tests
- Run business continuity tests
Implement necessary training to ensure correct deployment, configuration, and operations of security-relevant subsystems and components; ensure awareness training of all users and non-privileged operators of the system and/or its components
Training is not necessary simply to preclude vulnerabilities introduced through operations and configuration error, though this is critical to correct ongoing secure performance. In many jurisdictions, proper training must be performed and documented to demonstrate due diligence and substantiate corrective actions or sanctions in cases where exploits or error compromise business objectives or to absolve contributory responsibility for events that bring about harm or injury.
Determine "what has gone wrong?"
The very purpose of governance is the establishment of a feedback loop that determines the efficacy of plan execution and implements corrections, where required. It must be borne in mind that the imperfections in plans executed are rooted both in human processes and cybernetic processes.
21.13 Phase H: Architecture Change Management
As stated in Part II, 17. ADM Architecture Requirements Management (Requirements Management), change is driven by new requirements. Changes in security requirements are often more disruptive than a simplification or incremental change. Changes in security policy can be driven by statute, regulation, or something that has gone wrong.
Changes in security standards are usually less disruptive since the trade-off for their adoption is based on the value of the change. However, standards changes can also be mandated. Similar approaches to these changes as mentioned above are good rules of thumb for security as well. However, security changes are often infrastructure changes, and can have a greater impact. A seemingly small security requirement change can easily trigger a new architecture development cycle.
Determine "what has gone wrong?"
Good security forensics practices in conjunction with a written published security policy make determination of what has gone wrong possible. Further, they make enforcement possible. As the guidance above suggests, minor changes can be made in the context of change management and major changes will require a new architecture effort.
Incorporate security-relevant changes to the environment into the requirements for future enhancement (enhancement of existing objective)
Changes that arise as a result of a security problem or new security technology will feed into the Requirements Management process.
21.14 References
- NIST 80018: Guide for Developing Security Plans for Information Technology Systems
- NIST 80027: Engineering Principles for Information Technology Security (A Baseline for Achieving Security)
- NIST 80030: Guide for Risk Management for Information Technology Systems