Modeling SABSA®
in ArchiMate®
00. Preface
The Joint Working Group aims to develop a settled consensus of core security elements, relationships, and properties - referred to collectively as the “Security Overlay”.
01. Introduction
01.01 Background
SABSA Blue Book (Executive Summary)
01.02 The ArchiMate® Specification
(see:03. Introduction of ArchiMate)
01.03 Purpose
02. Rationale for the Alignment of SABSA and ArchiMate
02.1 Benefits of Modeling
02.2 The Case of an ArchiMate Security Perspective
02.3 Benefits that Modeling Can Bring to SABSA
02.4 Benefits of Modeling to the Practitioner
02.5 Vendor Neutrality
03. Introduction of ArchiMate
03.1 Core Elements
03.2 Core Relationships
03.3 Extension Layers and Elements
03.4 ArchiMate Language Customization
03.4.1 User-Defined Attributes
03.4.2 Specializations and “Stereotypes”
03.4.3 Overloaded Relationships
03.5 The ArchiMate Full Framework
04. Aligning SABSA and ArchiMate Framework
04.1 Introduction to the Security Overlay
04.2 An Overview of the Task
04.3 Risk & Security Modeling in the ArchiMate Specification
04.4 The Basic Element and Relationships
05. The Motivation Aspect
05.1 Value & Loss
05.2 Value Chain
05.3 SABSA Business Attributes
5.3.1 Structural Placement of Business Attributes
5.3.2 Traceability of Business Attributes
05.4 Meaning
Figure 22: Use of Meaning to Externalize Context-Sensitive Metrics
05.5 Impact, Threat, Vulnerability, and Risk
05.6 Controls: Objectives, Requirements, and Measures
05.7 Multi-Tiered Security
05.8 Regulations and Standards
05.9 Articles, Mandates, and Compliance Objectives
Figure 27: Articles and Compliance Objectives
05.10 Control Mechanisms
05.11 Trust
06. Modeling Contextual Security Architecture
Figure 29: Developing and Maintaining the Contextual Security Architecture
06.1 Business Assets
6.1.1 Capability and Value Stream
6.1.2 Business Object
6.1.3 Business Service, Interface, and Service Level Agreements
06.2 Business Risk
06.3 Business Process/Function/Interaction
06.4 Business Roles and Actors
6.4.1 Governance
6.4.2 Threat Actors
06.5 Business Geography
06.6 Business Time Dependencies
07. Modeling Conceptual Security Architecture
07.1 Attribute Profiling
07.2 Risk Management & Strategy
7.2.1 Risk Management
7.2.2 Policy Architecture
7.2.3 Multi-Regulatory Compliance
07.3 Conceptual Security Services
07.4 Identity and Trust
7.4.1 Identity and Access Rights
7.4.2 Roles and Responsibilities
7.4.3 Trust
Figure 51: Common Examples of Signals Crossing Domain Boundaries
Figure 53: Trust Attributes Associated with Inter-Domain Signals
07.5 Domain Framework Model
07.6 Security Events
08. Modeling Logical Security Architecture
8.1.1 Application Components
8.1.2 Security Configuration
8.1.3 Software Defects and Malware
8.1.4 Data Assets
08.2 Risk Modeling
8.2.1 Risk Modeling
8.2.2 The Scenario
08.3 Application Functionality and Services
08.4 Logical Access Management
8.4.1 Account
8.4.2 Application Role
8.4.3 Application Service
8.4.4 Application Process and Function
8.4.5 Application Interface
08.5 Logical Domains
08.6 Timing and Events
8.6.1 Application Security Events
09. Modeling Physical Security Architecture
09.1 Data and Technology Assets
9.1.1 Artifact
9.1.1.1 Executable
9.1.1.2 Data
9.1.1.3 Configuration
9.1.2 Device and Node
09.2 Risk Management Practices
9.2.1 Defect
09.3 Process Mechanisms
9.3.1 Technology Functions and Services
9.3.2 System Software
09.4 Human-Machine Interfaces
9.4.1 Technology Interfaces
09.5 Physical Environment
09.6 Timing and Interrupts
9.6.1 Technology Security Events
10. Conclusion