SABSA White Paper
SABSA White Paper
SABSA White Paper
Executive Summary
SABSA®1 is a model and a methodology for developing risk-driven enterprise information security architectures
and for delivering security infrastructure solutions that support critical business initiatives. At the heart of this
methodology is the SABSA® Model, a top-down approach that drives the SABSA® Development Process. This
process analyses the business requirements at the outset, and creates a chain of traceability through the strategy
& concept, design, implementation and ongoing ‘manage and measure’ phases of the SABSA® Lifecycle to
ensure that the business mandate is preserved. The whole methodology is further supported by framework tools
created from practical experience, including the SABSA® Matrix and the SABSA® Business Attributes Profile.
This white paper explores the advantages of this business-focused model for creating security architecture. It
discusses the pitfalls of a technology-centric approach, and recognises the challenges of integrating the business
leaders with the technology strategists in order to fulfil the potential of the enterprise.
The paper also discusses the SABSA® methodology, explaining this approach by comparing it to the classical
definition of architecture (i.e., the construction of buildings). By illustrating the contextual, conceptual, logical,
physical, component-oriented and operational layers of the architectural process, a comprehensive approach
unfolds that provides a roadmap for business and information and communications technology (ICT) leadership
to follow to ensure the technology foundation becomes an enabler of business performance.
1 SABSA®: System and Business Security Architecture – a registered trademark of SABSA Limited
Managing Complexity
One of the key functions of ‘architecture’ as a tool of the architect is to provide a framework within which
complexity can be managed successfully. Small, isolated, individual projects do not need ‘architecture’,
because their level of complexity is limited and the chief designer can manage the overall design single-handed.
However, as the size and complexity of a project grows, then it is clear that many designers are needed, all
working as a team to create something that has the appearance of being designed by a single ‘design authority’.
Also, if an individual project is not isolated, but rather is intended to fit harmoniously within a much wider,
highly complex set of other projects, then an architecture is needed to act as a ‘road-map’ within which all of
these projects can be brought together into a seamless whole. The result must be as though they were all indeed
part of a single, large, complex project. This applies whether the individual projects are designed and
implemented simultaneously, or whether they are designed and implemented independently over an extended
period of time.
Revised 7 February 2005 (A4) Page 2 of 17
Copyright © 1995 - 2005 SABSA Limited. All Rights Reserved
As complexity increases, then a framework is needed within which each designer can work, contributing to the
overall design. Each design team member must also be confident that his/her work will be in harmony with that
of colleagues and that the overall integrity of the design will not be threatened by the work being split across a
large design team.
The role of ‘architecture’ is to provide the framework that breaks down complexity into apparent simplicity.
This is achieved by layering techniques – focusing attention on specific conceptual levels of thinking, and by
modularization – breaking the overall design into manageable pieces that have defined functionality and defined
interfaces. This process is also known as ‘systems engineering’.
Usability
Is the solution appropriate to the technical competence of the intended users and will it be ergonomically
acceptable to those users?
Inter-Operability
Will the solution provide for the long-term requirements for inter-operability between communicating
information systems and applications?
Integration
Will the solution integrate with the wide range of computer applications and platforms for which it might be
required in the long term?
Scalability of Platforms
Will the solution fit with the range of computing platforms3 with which it might be required to integrate?
Scalability of Cost
Is the entry-level cost appropriate to the range of business applications for which the solution is intended?
Re-Usability
Is the solution re-usable in a wide variety of similar situations to get the best return on the investment in its
acquisition and development?
Operations Costs
Will the cost impact on systems operations be minimised?
Administration Costs
Will the solution provide an efficient means for security administration to minimise the costs of this activity?
Enabling Business
Finally there are usually a number of business-specific requirements that influence the security strategy. These
include requirements where security has an important role in generating the appropriate level of confidence so
as to enable new ways of doing business using the latest advances in information technology, such as:
• Exploiting the global reach of the Internet;
• Using global e-mail;
• Outsourcing the operational management of networks and computer systems;
• Providing remote access to third parties;
2 Including the number of end-users and service-delivery points, their geographical location and their
distribution.
3 Potential platforms range from high-end mainframes, through mid-range servers, down to PCs and work-
stations.
There is another configuration of these six layers which is perhaps more helpful, shown in Figure 1. In this
diagram the ‘operational security architecture’ has been placed vertically across the other five layers. This is
because operational security issues arise at each and every one of the other five layers. Operational security has
a meaning in the context of each of these other layers.
4 Published through the Zachman Institute for Framework Advancement. Reference: http://www.zifa.com
Contextual Security policy making, information classification, risk analysis process, business requirements
Layer collection and specification, organisational and cultural development, etc.
Conceptual Major programmes for training and awareness, business continuity management, audit and
Layer review, process development for registration, authorisation, administration and incident handling,
development of standards and procedures, etc.
Component Products, technology, standards and tools evaluation and selection, project management,
Layer implementation management, operation and administration of individual components, etc.
5 There still remains a potential issue regarding consistency and lack of conflict between all the various cells.
Strategy &
Concept
Manage &
Design
Measure
Implement
User Management Operational Risk Management Legal / Regulatory Technical Strategy Business Strategy
Attributes Attributes Attributes Attributes Attributes Attributes Attributes
Timely Integrity-Assured
Usable Non-Repudiable
Owned
Private
Trustworthy
SABSA® Implementation
The SABSA® Lifecycle contains an activity called ‘Implement’. However, it is unlikely that a major strategic
enterprise-wide security architecture will ever be implemented as a single project. What is more likely is that
the architecture provides a blue-print and a road-map that guides a whole series of separate implementation
projects, each of which is driven by a specific business initiative and funded by a budget associated with that
initiative. Some of these projects may themselves be ‘infrastructure projects’, such as building an integrated,
enterprise wide, unified directory service.
The reality is that implementation will usually be fragmented in this way. Thus the main purpose of the security
architecture is to ensure that this fragmentation does not lead to a piecemeal approach to design. Despite the
fragmented projects, the overall systems environment should maintain its architectural integrity – provided that
the architecture has been created and documented, and provided that project teams refer to it and are guided by
it. Individual projects should therefore be subject to architectural approval by an Architecture Board.
For those who would like greater detail on this subject, there is a book due to be published in the near future
entitled ‘Enterprise Security Architecture: A Business Driven Approach’, which expands these ideas and
explains in detail the methodology outlined here.