Physical Artifacts:
Assets (What) | Motivation (Why) | Process (How) | People (Who) | Location (Where) | Time (When) |
---|---|---|---|---|---|
Data Assets | Risk Management Practices | Process Mechanisms | Human Interface | Infrastructure | Processing Schedule |
- Dictionary & Data Storage - Devices Inventory |
- Risk Management Rules & Procedures - Risk Metadata |
- Working Procedures - Application Software - Middleware - Systems - Security Mechanisms Process Control Points |
- User Interface to Business Systems - Identity & Access Control Systems |
- Workspaces - Host Platforms, Layout of Devices & Networks |
- Timing & Sequencing of Processes & Sessions |
Physical Activities:
Assets (What) | Motivation (Why) | Process (How) | People (Who) | Location (Where) | Time (When) |
---|---|---|---|---|---|
Physical Asset Management | Risk Data Management | Operations Management | User Support | Resources Management | Performance Data Collection |
- Change Management - Platform & Data Storage Management |
- Risk Procedure Management - Risk Metadata Management |
- Job, Incident, Event & Disaster Recovery Management | - Service Desk - Problem Management -Request Management |
- Physical & Environmental - Security Management - Real Estate & Facilities Management |
- Business Systems Monitoring - Procedure Management |
Below we’re again using Protege to expand our SABSA Physical Architecture Matrix Ontology:
Snapshot Protege Ontology File: SABSA Matrics 2018 - Ch09 - Physical
Below we’re again using Protege to expand our SABSA Component Architecture Matrix Ontology:
Snapshot Protege Ontology File: SABSA Matrics 2018 - Ch08
Snapshot ArchiMate Model: Figure 64: Developing the SABSA Physical Security Architecture
The principal Assets
in this cell are the persisted formats of information/knowledge (applications and data) and IT infrastructure (hardware, system software, and network components).
The “bricks & mortar” type of physicla Assets
are described in Section 9.5: Physical Environment
In standard ArchiMate notation, Artifact
serves as the universal passive structure element of the Technology Layer
. It is overloaded to represent any kind of data object
in the file system: executables, scripits, data and configuration files, databases, documents, specifications - everything in fact, except System Software
.
The Security Overlay refines Artifact
into sub-types that better reflect its different purposes and provides appropriate properties: see below Figure 65.
Snapshot ArchiMate Model: Figure 65: Stereotypes of Artifact
Snapshot ArchiMate Model: Figure 66: Configuration Files
Nodes
represent a computational or physical resource that hosts, manipulates or interacts with other computational or physical resources.
Devices
model physical IT resources (i.e., hardware) upon which system software and Artifacts
may be stored or deployed for execution.
When modeling security infrastructure, it is sometimes useful to model nodes
and devices
having a specific security purpose as distinct stereotypes so taht role-specific properties can be assigned.
Below Figure 67 example shows a Hardware Security Module (HSM) being modeled as a stereotyped Device
with properties that reflect FIPS-140-2 assurance levels and a VPN Gateway as a stereotyped Node
with preperties that reflect the Common Criteria Evaluation Assurance Levels (EAL) for the protection profile of a type of product.
Snapshot ArchiMate Model: Figure 67: Stereotyping Security Nodes and Devices
Software Defects are either published in product threat advisories, CVE (Common Vulnerabilities and Exposures, CVE.org) lists, or discovered in custom code.
The main exception to this is an organizataion’s process for approving deviations. Often there is legitimate business pressure for software to be deployed inot Production despite defects: a planned security control may not have been completed in time, or a penetration test has uncovereed a problem at the eleventh hour. In such circumstances, a decision must be made on risk. Models can be analyzed as “what if” scenarios to inform these risk decisions.
Below Figure 68 illustrates how highly relevant risk information is readily at hand:
Snapshot ArchiMate Model: Figure 68: Risk Management Practices
From a security perspective, Technology Services
fall into 2 main categories:
realize
the security services identified in the conceptual layer, andApplications
.Below Figure 69 illustrates the pattern by which a conceptual security service, authentication, is realized
by two distinct Technology Services
: one which provides a single sign-on (SSO) capability
for the organization domain, and the other, the local authentication mechanisms of a cloud application.
Snapshot ArchiMate Model: Figure 69: Realization of Security Services
Similar patterns can be deployed for other security services provided by the infrastructure:
The closed loops, including the invocation fo the conceptual Authentication service, its technical implementations and the services
being protected, means that the model can not only verify that assurance strength requirements
required by each Application Service
are met, but also trace any Compliance requirements
by identifying the closed loops described in Section 7.2.2.
Turning to Technology Services
in general, while the ability to enforce access control is as important as the earlier analysis of Application Services
, it is often mitigated by being co-located on the same Node
, local network (Communication Network
), or network domain. Priority should focus, therefore, on service invocations (调用) that originate outside trust domain boundaries.
Element | Schema File | Schema Visualization |
---|---|---|
Technology Service | Tech Srv JSON | ![]() |
Technology Process</br>Technology Function | Tech Proc & Func JSON | ![]() |
Element | Schema File | Schema Visualization |
---|---|---|
System Software | Tech Srv JSON | ![]() |
Element | Schema File | Schema Visualization |
---|---|---|
Technology Interface | Tech Int JSON | ![]() |
Element | Schema File | Schema Visualization |
---|---|---|
«Executable» | Executable JSON | ![]() |
«Data» | Data JSON | ![]() |
«Defect» Service | Defect JSON | ![]() |
Any comments, feel free to post to the Discussion Board.