Академический Документы
Профессиональный Документы
Культура Документы
12/11/2017
Target Corporation
SABSA Component Security Architecture
Implementation
Table of Contents
Abstract ......................................................................................................................................................... 2
The concept of Enterprise Security Architecture .......................................................................................... 2
SABSA MATRIX ......................................................................................................................................... 3
The Tradesman’s/Component layer view ..................................................................................................... 4
The Tradesman’s/Component layer Deliverables ......................................................................................... 5
Target Corp Business Risk Model ................................................................................................................ 0
Security Products and Tools ......................................................................................................................... 1
Conclusion .................................................................................................................................................... 0
References ..................................................................................................................................................... 0
Abstract
SABSA is a methodology for developing risk-driven enterprise information security and
information assurance architectures and for delivering security infrastructure solutions that
support critical business initiatives at Target Corporation. It is an open standard, comprising a
number of frameworks, models, methods and processes, free for use by all, with no licensing
required for end-user organizations who make use of the standard in developing and
implementing architectures and solutions.
SABSA is unique in that it fulfils ALL of the following criteria:
It is an open standard, comprising frameworks, models, methods and processes, free for
use by all, with no licensing required for end-user organizations who make use of the
standard in developing and implementing architectures and solutions;
The SABSA framework is not related to any IT solutions supplier and is completely
vendor-neutral,
The SABSA framework is scalable, that is, it can be introduced in subsequent areas and
systems and implemented incrementally,
The SABSA framework may be used in any industry sector and in any organization
whether privately or publicly owned, including commercial, industrial, government,
military or charitable organizations;
The SABSA framework can be used for the development of architectures and solutions at
any level of granularity of scope, from a project of limited scope to an entire enterprise
architectural framework;
SABSA education, training and certification can be obtained through any one of the
worldwide network of Accredited Education Partners (AEPs) of the SABSA Institute, by
registering for and attending the SABSA Institute courses offered through those AEPs
and by sitting the appropriate examinations also offered through the AEP network,
SABSA may be incorporated into any appropriate computer software tool by a software
tool vendor who wishes to offer such a tool to the open market.
talk about ‘enterprise architecture’ ‘or ‘enterprise security architecture’, it is with this concept of
enterprise in mind that I do so. Enterprise security architecture is a business-driven and a
structured inter-relationship between the technical and procedural solutions that support the long-
term needs of the business. If the architecture is to be successful, then it must provide a rational
framework within which decisions can be made upon the selection of security solutions. The
decision criteria should be derived from a thorough understanding of the business requirements,
including:
SABSA MATRIX
The diagram below shows the SABSA operation of controls and how they can enhance the
security posture of Target Corporation.
The deliverables for this layer in relation to Target Corporation and that I would recommend be
implemented are;
a) Updated dictionary defining the syntax rules of all data structures required by the security
architecture.
b) Framework for security standards and a list for all the security standards that are required.
c) A list with descriptions and specifications for all security products and tools.
d) A naming scheme and framework for defining identities, functions, actions and ACL’s.
e) Detailed design of the security infrastructure.i.e. processes, nodes, addresses, and
protocols.
f) Detailed specification of procedural step timings and sequencing needed to implement
the control structure execution model from the layer above.
Security architecture at Target Corporation is driven by the following business risk factors;
These risk factors mentioned above lead to the business risk model for Target Corporation as
shown below. The component security architecture layer of the SABSA model falls in line with
Target Corporation component layer that happened to be the vulnerable network segment. The
component layers failures and poor vendor security and compliance auditing led to a massive
security breach that started at one of their vendors. The Vendor was compromised by a phishing
attack, attacker was able to steal admin login credentials to the Ariba vendor portal that gave the
attacker access to the internal Target Corporation infrastructure from where the attacker was able
to upload malware that was used to exfil PII data of Target Corp customers. There were multiple
failures in the component layer of target corporation. My organization is experienced and
prepared to provide and deliver a well-designed component security architecture layer that will
ensure that another breach won’t happen if implemented as we will design it. I am grateful as the
senior leadership are onboard with the component layer security architecture over whole.
4 Supply Chain Diversification vendors to Political or disrupt port large portion of Diversify
and Third- of our supply supply financial activities and affect our merchandise vendor base
Party chain merchandise instability, foreign trade is sourced, directly
vendors to our trade beyond our control or indirectly, from
distribution restrictions, the affecting our outside the United
centers, stores outbreak of bottom line States, and
and our guests pandemics, political instability
in a timely and labor unrest. can affect our
efficient operations
manner
5 Legal, Auditing and Compliance to earnings are Deterioration in failure to comply U.S. consumer
Regulatory, compliance all rules and highly macroeconomic with federal, confidence and
Global and regulations susceptible to conditions or state, local, and the health of
Other that govern the state of consumer international laws, the U.S.
External our operations macroeconomic confidence could or changes in economy.
compliance conditions and negatively affect these laws could
consumer our business in increase our costs,
many ways, reduce our
including slowing margins, and
sales growth. lower our sales
Logical Logical Security Physical security Components Types Component Type/current tools
Security services mechanisms
strategy
Prevention Entity security Naming Cryptographic RSA hard token
services standards and hardware RSA software token
Communication procedures Cryptographic MS Active Directory
security Registration software tool systems
services policy, kits ArcSight/Splunk/LogRythm
Application and procedure and Directory SIEM
system security authority system products IBM Guardium Data
services Certificate Enterprise Encryption
Security policy, syntax, security Bitlocker
management procedure, management Sophos safe Guard
services. authority system, tools Dell Encryption Enterprise
revocation list, File encryption McAfee Complete Data
publishing and products Protection
management Personal HPE Secure Data
authentication Bitdefender Gravity Zone
tokens and Dual factor authentication
devices
CCTV cameras
Containment Entity Secure premises Intrusion Cisco NIDS/IDS/NIPS
authorization with locks detection Night Vision CCTV
Stored data Authorization systems Camera, Infrared, Analog
confidentiality procedures Physical security 1000 TVL / 960H & HD
Software Secure alarms 1080p
integrity management Personal Outdoor Motion Sensor,
Physical protocols authentication Weatherproof PIR Motion
security Fire prevention, tokens and Detector, Alarm Output
Environmental detection, devices RSA hard token
security quenching Security Network segmentation
auditing tools
TARGET CORPORATION
Conclusion
In conclusion, I can say that the component security architecture layer of the SABSA model
deals with tool protection, operational risk management tools, tool deployment, personnel
deployment, security management tools and service monitoring tools that I have recommended
to be implemented at Target Corporation infrastructure as shown on the security products and
tools table. This was made possible by strict adherence to all relevant component security
architecture standards. My analysis shows that all the components that I have recommended to
be implemented do have compatibility, consistency and inter-operability between them. I am
grateful that the senior leadership at Target Corporation was onboard with this plan and its
implementation henceforth will enhance security posture of Target Corporation to an acceptable
level.
References
Item 1A. Risk Factors. (2014, June 18th). Retrieved December 10th, 2017, from Target 2014 Annual
report: https://corporate.target.com/annual-reports/2014/10-k/10-K-Part-I/Item-1A-Risk-
Factors
Sherwood, J., Clark, A., & Lynas, D. (2005). Enterprise Security Architecture. Boca Raton: CRC. Retrieved
October 26th, 2017