Author's Note |
|
xxiii | |
Preface |
|
xxvii | |
Acknowledgments |
|
xxix | |
|
|
|
Foundational Concepts for IA2 |
|
|
3 | (10) |
|
|
3 | (1) |
|
|
4 | (1) |
|
Foundations of Successful Architecture |
|
|
5 | (6) |
|
|
6 | (1) |
|
Enterprise Architecture and Systems Architecture |
|
|
7 | (1) |
|
Information Assurance: A Working Definition |
|
|
8 | (1) |
|
Mission Integrity versus Mission Entropy |
|
|
9 | (1) |
|
Melding Architecture and Information Assurance |
|
|
9 | (1) |
|
|
10 | (1) |
|
Ontologies, Taxonomies, and Hierarchies |
|
|
11 | (1) |
|
|
11 | (1) |
|
Identify, Enumerate, Articulate, and Address |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (36) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (3) |
|
IA2 Architectural Drivers |
|
|
18 | (3) |
|
|
18 | (2) |
|
|
20 | (1) |
|
|
21 | (6) |
|
|
21 | (2) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
Intraorganizational/Interoganizational |
|
|
26 | (1) |
|
|
27 | (2) |
|
|
29 | (1) |
|
IA Compliance Requirements |
|
|
30 | (3) |
|
|
33 | (5) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
IA2 Compliance Verification |
|
|
38 | (2) |
|
IA Compliance Verification: A Sample Resource |
|
|
38 | (1) |
|
|
38 | (2) |
|
|
40 | (8) |
|
|
41 | (1) |
|
|
42 | (1) |
|
[ IA] Concept of Operations (CONOPS) |
|
|
42 | (1) |
|
[ IA] Portfolio Management (PfM) |
|
|
42 | (1) |
|
[ IA] Enterprise Systems Engineering |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
Operations and Maintenance |
|
|
45 | (1) |
|
IA2 Implementation Taxonomy |
|
|
46 | (1) |
|
IA2 Implementation Taxonomy Examples |
|
|
46 | (2) |
|
Conclusion and Commentary |
|
|
48 | (1) |
|
|
49 | (20) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (17) |
|
|
51 | (1) |
|
Define What the Solution Is and What It Is for |
|
|
51 | (6) |
|
|
57 | (1) |
|
|
57 | (1) |
|
Define Where the Solution Resides |
|
|
57 | (1) |
|
Environment as Seen from the IA2F Views |
|
|
58 | (1) |
|
|
58 | (1) |
|
Establish the Connection of the Solution to Strategic Goals |
|
|
58 | (4) |
|
Identify Inputs to the IA2 (Influences and Dependencies) |
|
|
62 | (1) |
|
Define What You Need to Know |
|
|
62 | (1) |
|
Discovery of As-Is (Current Orgabnizational Posture) |
|
|
62 | (1) |
|
Document the Current State |
|
|
62 | (1) |
|
|
63 | (1) |
|
Evaluate the Current State |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (2) |
|
|
66 | (1) |
|
Produce Expected Outcomes |
|
|
66 | (1) |
|
Summary of IA2 Process Phases |
|
|
67 | (1) |
|
Conclusion and Commentary |
|
|
67 | (2) |
|
|
69 | (22) |
|
|
69 | (1) |
|
|
70 | (1) |
|
IA Quantification Framework (IAQF) |
|
|
70 | (12) |
|
IA Quantification: Stakeholder Perspective |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
IA Quantification: Asset/Target Perspective |
|
|
74 | (1) |
|
Financial (Currency Measurement) |
|
|
74 | (1) |
|
Development (Quality Measurement) |
|
|
75 | (1) |
|
Operational (Functional Parameter Measurement) |
|
|
75 | (1) |
|
Risk Management (Standard Risk Assessment Quantification) |
|
|
75 | (1) |
|
|
75 | (1) |
|
Attack Modeling: An Example |
|
|
76 | (1) |
|
IA Quantification: Vulnerability |
|
|
76 | (1) |
|
IA Quantification: Threat Perspective |
|
|
77 | (1) |
|
Threat Probability Assessment (TPA) |
|
|
77 | (4) |
|
|
81 | (1) |
|
|
82 | (1) |
|
IA Quantification Process (IAQP) |
|
|
82 | (5) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
Conclusion and Commentary |
|
|
87 | (4) |
|
|
|
Organizational Views of IA |
|
|
91 | (32) |
|
|
91 | (1) |
|
|
91 | (1) |
|
The Message of IA to the Organization |
|
|
92 | (2) |
|
|
94 | (1) |
|
|
94 | (12) |
|
The Scope of Risk Governance, Management, and Assessment |
|
|
97 | (2) |
|
Guiding Risk Analysis with Threat Assessments |
|
|
99 | (1) |
|
Threat Probability Assessment |
|
|
99 | (3) |
|
Intelligent Resource Allocation |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (3) |
|
|
106 | (7) |
|
Employment Practices and Policies |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
Compliance Management Program |
|
|
110 | (1) |
|
Compliance Assessment Process |
|
|
111 | (2) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (6) |
|
|
116 | (1) |
|
Championing IA Outside the IA Environment |
|
|
117 | (1) |
|
|
117 | (1) |
|
Accommodate the People Factor in IA Perception |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
Vendor and Product Selection |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
Problem-Solving Influence on IA2F |
|
|
121 | (1) |
|
Commentary and Conclusion |
|
|
121 | (2) |
|
|
123 | (18) |
|
|
123 | (1) |
|
|
124 | (1) |
|
IA Requirements Engineering and Compliance Management |
|
|
124 | (3) |
|
IA Compliance Requirements Engineering |
|
|
126 | (1) |
|
IA Requirements Engineering and SE |
|
|
127 | (9) |
|
Business Process Decomposition |
|
|
130 | (2) |
|
|
132 | (2) |
|
Domain Functional-Isolation Requirements Engineering |
|
|
134 | (2) |
|
Requirements Traceability |
|
|
136 | (3) |
|
Conclusion and Commentary |
|
|
139 | (2) |
|
|
141 | (12) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
Wireless Networks: An Example |
|
|
143 | (4) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
Communications (Voice and Data): An Example |
|
|
147 | (4) |
|
Traditional Communications |
|
|
147 | (1) |
|
|
147 | (3) |
|
Communications Influence on the IA2F |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
Conclusion and Commentary |
|
|
151 | (2) |
|
IA2: Context of IA Services |
|
|
153 | (72) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (6) |
|
Defense-in-Depth Perspective |
|
|
154 | (3) |
|
Exogenous View of Defense-in-Depth |
|
|
157 | (1) |
|
Endogenous View of Defense-in-Depth |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
IA Compliance Management Program |
|
|
160 | (3) |
|
|
161 | (1) |
|
Compliance Assessment: Subjective |
|
|
161 | (1) |
|
Compliance Assessment: Objective (Quantification) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (5) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
Audit Responsibilities and Performance |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
Sarbanes-Oxley: An Audit and Assessment Example |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (8) |
|
|
168 | (1) |
|
Roles and Responsibilities |
|
|
169 | (2) |
|
|
171 | (1) |
|
|
171 | (1) |
|
Policy Examples: E-Mail and Internet Appropriate Use |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
Using Social Psychology to Enforce Policies |
|
|
173 | (1) |
|
Audience Framing and Message Delivery |
|
|
174 | (1) |
|
|
175 | (1) |
|
Security Education, Training, and Awareness Management |
|
|
176 | (4) |
|
Security Education, Training, and Awareness (SETA) Policy |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
Effectiveness Metrics (Tracking) |
|
|
179 | (1) |
|
|
180 | (4) |
|
|
181 | (1) |
|
|
181 | (1) |
|
External Privacy Qualifiers |
|
|
181 | (1) |
|
Internal Privacy Qualifiers |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
Censorship IA2 Perspective |
|
|
183 | (1) |
|
Enterprise Operations Management: IA Context |
|
|
184 | (4) |
|
|
184 | (2) |
|
Network Management Services |
|
|
186 | (1) |
|
Network Management Mechanics |
|
|
186 | (1) |
|
Network Management and IA2 |
|
|
187 | (1) |
|
Operations Security Management |
|
|
187 | (1) |
|
Computer Security Incident Response Team (CSIRT) |
|
|
188 | (6) |
|
|
190 | (1) |
|
|
190 | (2) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
192 | (2) |
|
|
194 | (3) |
|
Vulnerability Assessments |
|
|
194 | (1) |
|
|
195 | (1) |
|
Deliverable Format and Content |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (4) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
Business Impact Assessment |
|
|
201 | (5) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
202 | (2) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
Business Continuity Management |
|
|
206 | (6) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
COOP: Determining Priorities |
|
|
209 | (2) |
|
|
211 | (1) |
|
Disaster Recovery Planning (DRP) and Disaster Recovery Management (DRM) |
|
|
212 | (6) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
Hot Site Solution: Dedicated |
|
|
214 | (1) |
|
Warm Site Solution: Shared (Warm) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
218 | (5) |
|
Business/Technical Drivers |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (2) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
Conclusion and Commentary |
|
|
224 | (1) |
|
IA2: Context of IA Mechanisms |
|
|
225 | (54) |
|
|
225 | (1) |
|
|
226 | (1) |
|
IA2 Context of IA Mechanisms |
|
|
226 | (3) |
|
|
229 | (1) |
|
Organizational Context of IA Mechanisms |
|
|
229 | (4) |
|
|
233 | (4) |
|
Homogeneous versus Heterogeneous IA Environments |
|
|
233 | (1) |
|
|
234 | (1) |
|
Standards in the IA2 Process: An Example |
|
|
235 | (2) |
|
|
237 | (5) |
|
Applied IA2: Anti-Malware |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
238 | (1) |
|
Anti-Spam: An Anti-Malware Mechanism |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
240 | (2) |
|
|
242 | (5) |
|
|
244 | (3) |
|
Intrusion Detection Systems |
|
|
247 | (3) |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
Security Service and Mechanism Aggregation |
|
|
250 | (1) |
|
|
250 | (3) |
|
|
251 | (1) |
|
|
251 | (2) |
|
|
253 | (1) |
|
|
253 | (1) |
|
Public Key Infrastructure (PKI) and Certificate Authority (CA) |
|
|
253 | (3) |
|
|
254 | (1) |
|
PKI Models (Trust Models) |
|
|
254 | (2) |
|
|
256 | (4) |
|
Applied IA2: OS Mechanistic IA Configurations |
|
|
257 | (2) |
|
|
259 | (1) |
|
Identity and Privilege Management |
|
|
260 | (3) |
|
Applied IA2: Identity and Privilege Management Capability |
|
|
260 | (3) |
|
|
263 | (1) |
|
Protecting the Information Infrastructure |
|
|
263 | (2) |
|
Applied IA2: Protecting the Information Infrastructure Capability |
|
|
263 | (2) |
|
|
265 | (3) |
|
Applied IA2: LAN Protection Capability |
|
|
265 | (3) |
|
|
268 | (4) |
|
Applied IA2: Cryptography Capability |
|
|
269 | (1) |
|
|
269 | (2) |
|
Cryptographic Services and Mechanisms: A Brief Example |
|
|
271 | (1) |
|
Cryptographic Influence on the IA2 F |
|
|
271 | (1) |
|
|
272 | (3) |
|
Applied IA2: E-Commerce Safeguard Capability |
|
|
273 | (1) |
|
Health Care E-Commerce Example |
|
|
274 | (1) |
|
Development Quality Assurance |
|
|
275 | (2) |
|
Applied IA2: DQA Capability |
|
|
276 | (1) |
|
Commentary and Conclusion |
|
|
277 | (2) |
|
Aligning IA2 and EA Standards |
|
|
279 | (24) |
|
|
279 | (1) |
|
|
280 | (1) |
|
Federal Enterprise Architecture (FEA): An Introduction |
|
|
280 | (9) |
|
|
282 | (1) |
|
Performance Reference Model |
|
|
282 | (1) |
|
|
283 | (1) |
|
Service Component Reference Model |
|
|
283 | (1) |
|
Technical Reference Model |
|
|
284 | (1) |
|
|
285 | (1) |
|
IA2 Alignment with FEA RMs |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
IA2 Alignment Deliverables |
|
|
288 | (1) |
|
FEA Security and Privacy Profile |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
289 | (1) |
|
Enterprise Architecture Organizations |
|
|
289 | (1) |
|
|
289 | (14) |
|
Section III IA2 Enterprise Context |
|
|
|
The Framework Perspective |
|
|
303 | (12) |
|
|
303 | (1) |
|
Frameworks as Decision Support Tools |
|
|
304 | (3) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
306 | (1) |
|
Business versus Technical Perspectives |
|
|
307 | (1) |
|
Organizational Structure Context Framework |
|
|
307 | (8) |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
IA2 Perspective of the Frameworks |
|
|
312 | (3) |
|
|
315 | (22) |
|
|
315 | (1) |
|
|
316 | (1) |
|
Enterprise Context Framework |
|
|
316 | (3) |
|
Enterprise Perspective of IA Framework |
|
|
319 | (2) |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
Awareness, Training, and Education (ATE) Framework |
|
|
324 | (2) |
|
Objective-Centered Framework |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
Enterprise Life Cycle Management (ELCM) Framework |
|
|
327 | (3) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
330 | (2) |
|
Risk Management Framework |
|
|
332 | (1) |
|
Security Management Program Framework (SMP Framework) |
|
|
332 | (1) |
|
Reality Check Framework (RCF) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (2) |
|
|
337 | (32) |
|
|
337 | (1) |
|
|
337 | (1) |
|
|
337 | (3) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
IA Justification Based on Examining the Threat Space |
|
|
340 | (5) |
|
|
340 | (5) |
|
|
345 | (1) |
|
Expanding on the Adversary Threat Space |
|
|
345 | (14) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
349 | (1) |
|
Computer System Penetration |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
351 | (1) |
|
Computer Criminal Psychology |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
Asymmetrical Adversarialism |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
356 | (1) |
|
Intellectual Property (IP) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
Desired Results of Target Attack |
|
|
357 | (1) |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
359 | (1) |
|
|
359 | (1) |
|
|
359 | (2) |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
360 | (1) |
|
IA Core Principles as IA Justification |
|
|
361 | (1) |
|
IA Operations Cycle as IA Justification |
|
|
361 | (3) |
|
|
362 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
365 | (2) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
367 | (2) |
|
|
369 | (18) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
370 | (10) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
371 | (2) |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
375 | (1) |
|
Increase in Decision-Making Complexity |
|
|
376 | (1) |
|
|
376 | (2) |
|
|
378 | (1) |
|
Summary of IA Future Vision |
|
|
378 | (2) |
|
|
380 | (3) |
|
|
383 | (4) |
Appendix A: IA2 Process Template |
|
387 | (8) |
Appendix B: Templates of IA2 F Views |
|
395 | (10) |
Appendix C: IA Quantification Process Template |
|
405 | (10) |
Appendix D: Security Management Program Framework |
|
415 | (38) |
Appendix E: Security Management Program Template Outline |
|
453 | (8) |
Appendix F: NIST Document Applicability Template |
|
461 | (28) |
Appendix G: IA Standards Best Practices References |
|
489 | (6) |
Appendix H: Root Cause Analysis Template |
|
495 | (12) |
Appendix I: Problem Assertion Document Template |
|
507 | (18) |
Appendix J: Privacy Management Program Outline |
|
525 | (6) |
Appendix K: E-Insurance |
|
531 | (6) |
Appendix L: Reading List |
|
537 | (4) |
Glossary |
|
541 | (14) |
References |
|
555 | (4) |
List of Figures |
|
559 | (4) |
List of Tables |
|
563 | (8) |
Index |
|
571 | |