Modeling SABSA®
in ArchiMate®
00. Preface
The Joint Working Group aims to develop a settled consensus of core security elements, relationships, and properties - referred to collectively as the “Security Overlay”.
01. Introduction
01.01 Background
SABSA Blue Book (Executive Summary)
01.02 The ArchiMate® Specification
(see:03. Introduction of ArchiMate)
01.03 Purpose
02. Rationale for the Alignment of SABSA and ArchiMate
02.1 Benefits of Modeling
02.2 The Case of an ArchiMate Security Perspective
02.3 Benefits that Modeling Can Bring to SABSA
02.4 Benefits of Modeling to the Practitioner
02.5 Vendor Neutrality
03. Introduction of ArchiMate
03.1 Core Elements
03.2 Core Relationships
03.3 Extension Layers and Elements
3.3.1 Strategy Layer
3.3.2 Motivation Elements
3.3.3 Implementation and Migration Layer
3.3.4 Composite Elements
03.4 ArchiMate Language Customization
03.4.1 User-Defined Attributes
03.4.2 Specializations and “Stereotypes”
03.4.3 Overloaded Relationships
03.5 The ArchiMate Full Framework
04. Aligning SABSA and ArchiMate Framework
04.1 Introduction to the Security Overlay
04.2 An Overview of the Task
04.3 Risk & Security Modeling in the ArchiMate Specification
(see:06.2 Business Risk05.6 Controls: Objectives, Requirements, and Measures05.10 Control Mechanisms)
04.4 The Basic Element and Relationships
06. Modeling Contextual Security Architecture
06.0 Overview
Table 19: SABSA Contextual Architecture
Figure 29: Developing and Maintaining the Contextual Security Architecture
Table 20: Contextual Elements
06.1 Business Assets
6.1.1 Capability and Value Stream
Table 21: The Value Stream Element
6.1.2 Business Object
Table 22: Business Object Security Properties
6.1.3 Business Service, Interface, and Service Level Agreements
Table 23: Business Service Properties
06.2 Business Risk
06.3 Business Process/Function/Interaction
Table 24: Business Behavior Properties
06.4 Business Roles and Actors
Table 25: Actor & Role Properties
6.4.1 Governance
Table 26: RACI Properties
6.4.2 Threat Actors
Table 27: Threat Agent Properties
06.5 Business Geography
06.6 Business Time Dependencies
07. Modeling Conceptual Security Architecture
Table 28: SABSA Conceptual Architecture
07.1 Attribute Profiling
07.2 Risk Management & Strategy
7.2.1 Risk Management
7.2.2 Policy Architecture
7.2.3 Multi-Regulatory Compliance
07.3 Conceptual Security Services
07.4 Identity and Trust
7.4.1 Identity and Access Rights
7.4.2 Roles and Responsibilities
7.4.3 Trust
Figure 51: Common Examples of Signals Crossing Domain Boundaries
Figure 53: Trust Attributes Associated with Inter-Domain Signals
07.5 Domain Framework Model
07.6 Security Events
08. Modeling Logical Security Architecture
8.1.1 Application Components
8.1.2 Security Configuration
8.1.3 Software Defects and Malware
8.1.4 Data Assets
08.2 Risk Modeling
8.2.1 Risk Modeling
8.2.2 The Scenario
08.3 Application Functionality and Services
08.4 Logical Access Management
8.4.1 Account
8.4.2 Application Role
8.4.3 Application Service
8.4.4 Application Process and Function
8.4.5 Application Interface
08.5 Logical Domains
08.6 Timing and Events
8.6.1 Application Security Events
09. Modeling Physical Security Architecture
09.1 Data and Technology Assets
9.1.1 Artifact
9.1.1.1 Executable
9.1.1.2 Data
9.1.1.3 Configuration
9.1.2 Device and Node
09.2 Risk Management Practices
9.2.1 Defect
09.3 Process Mechanisms
9.3.1 Technology Functions and Services
9.3.2 System Software
09.4 Human-Machine Interfaces
9.4.1 Technology Interfaces
09.5 Physical Environment
09.6 Timing and Interrupts
9.6.1 Technology Security Events
10. Conclusion
05. The Motivation Aspect
05.1 Value & Loss
Table 10: Proposed Value Property Overlay
05.2 Value Chain
Table 11: Value Chain Properties
05.3 SABSA Business Attributes
Table 12: SABSA Attribute Properties
5.3.1 Structural Placement of Business Attributes
5.3.2 Traceability of Business Attributes
05.4 Meaning
Figure 22: Use of Meaning to Externalize Context-Sensitive Metrics
05.5 Impact, Threat, Vulnerability, and Risk
(see:06.2 Business Risk)
Table 13: Risk Element Properties
05.6 Controls: Objectives, Requirements, and Measures
05.7 Multi-Tiered Security
Table 14: Control Element Properties
05.8 Regulations and Standards
Table 15: Standard and Regulation Properties
05.9 Articles, Mandates, and Compliance Objectives
Figure 27: Articles and Compliance Objectives
Table 16: Compliance Conceptual Element Properties
05.10 Control Mechanisms
Table 17: Control Properties
05.11 Trust
Table 18: Trust Profile