Manage security architecture activities

advertisement
Contribute to implementing secure systems
TECHIS60331
This standard covers the competencies required to assist secure operations management activities under
supervision. This includes reacting to new threats and vulnerabilities.
Establish processes for maintaining the security of information throughout its lifespan. Develop,
implement and maintains Security Operating Procedures in accordance with security policies and
standards. Manage the implementation of information security programmes, and co-ordinate information
security activities across the organisation.
Performance Criteria
1. carry out secure system operations in line with organisational standards
2. assist in developing architectural solutions for information systems which minimise risk exposure
3. contribute to the development of information systems architectures which include infrastructure
applications and cloud based solutions
4. take account of relevant security policies and threat/risk profiles while contributing to the
development of secure architectural solutions in order to mitigate risks and conform to legislation
5. advise information system designers on how to incorporate the security architecture into the
overall system design
6. review security requirements and assist in the development of the enterprise security architecture
7. review information systems designs for compliance with the security architecture in line with
organisational standards
8. maintain own awareness of the security advantages and vulnerabilities of common products and
technologies
Knowledge and Understanding
1. what is meant by information security architecture and secure systems
2. the processes, procedures, methods, tools and techniques relating to identifying information
systems vulnerabilities
3. what are the main security architectures and frameworks and how to apply them
4. how to interpret organisational information security policies and standards that apply to
information systems operations and apply them
5. the advantages and disadvantages of a range of commonly used components and security products
with respect to their vulnerabilities and protection capabilities
6. the most appropriate information security product and protocols to use in meeting the
organisation's security requirements
7. range of processes, procedures, methods, tools and techniques applicable to secure architecture
development activities and their deliverables
8. commonly used architectural frameworks including TOGAF and Zachman
9. a range of core security technologies including access control models, public and private
encryption, authentication techniques, intrusion detection
Carry out security architecture activities
TECHIS60341
The protection of information, services and systems relies on a range of technical and procedural activities,
often grouped in a framework. The framework will contain technical and logical, physical and process
controls that can be implemented across an organisation to reduce information and systems risk, identify
and mitigate vulnerability, and satisfy compliance obligations.
This role involves determining appropriate types of security controls and access management and network
security devices, and how they work.
Performance Criteria
1. interpret organisational security policies and threat/risk profiles
2. incorporate organisational security policies and threat/risk profiles into secure architectural
solutions that mitigate the risks and conform to legislation in line with business needs.
3. present technical security architecture solutions for network security, infrastructure security, and
application security
4. select security products and technologies based upon their security characteristics
5. design robust and fault-tolerant security mechanisms and components appropriate to the
identified risks
6. propose security architecture solutions which contribute to overall information
systems architectures in line with organisational standards
7. develop and implement appropriate methodologies, templates, patterns and frameworks to
support security architecture development
8. apply security architecture principles to networks, information systems, control systems,
infrastructures and products in line with organisational requirements
9. maintain own awareness of the security advantages and vulnerabilities of common security
products and technologies
Knowledge and Understanding
1. that security controls can be categorised and selected on the basis of that categorisation
2. where technical controls cannot be used, other controls can be selected
3. how technical controls (examples include cryptography, access management, firewalls, anti-virus
software and intrusion prevention systems) work in detail/at an advanced level of understanding
how the technical controls can be deployed in practice – and associated strengths and weaknesses
4. the need for security architecture and its relevance to systems, service continuity and reliability
5. the application of techniques such as defence in depth to demonstrate how controls can be
selected, deployed and tested to minimise risk and impact
6. how to differentiate between controls to protect systems availability and reliability; controls to
protect information; and controls to manage human behaviour
7. the trade-offs for functionality, usability and security
8. the role of operations in monitoring, maintaining and evolving controls
9. what is meant by information security architecture
10. how implementing a security architecture can improve mitigate risk for information system design
11. where to find information on the existing information systems architectures used within the
organisation
12. the relationship of information security architecture to IT and enterprise architectures
13. sources of recognised external security architectures and frameworks
14. the advantages and disadvantages of implementing a range of commonly used IT components and
security products Has knowledge of a range of core security technologies; e.g. access control
models, public and private encryption, authentication techniques, intrusion detection
15. the most appropriate information security product and protocols to use in meeting the
organisation's security requirements
16. the range of processes, procedures, methods, tools and techniques applicable to secure
architecture development activities and their deliverables
17. the role of architecture in information and network security
18. the fact that the organisation's network and information security architecture needs to align with
wider systems architecture development
19. the importance of using security standards, architectures and frameworks
20. how to represent security architecture designs and models
Manage security architecture activities
TECHIS60351
The protection of information, services and systems relies on a range of technical and procedural activities,
often grouped in a framework. The framework will contain technical and logical, physical and process
controls that can be implemented across an organisation to reduce information and systems risk, identify
and mitigate vulnerability, and satisfy compliance obligations.
This standard covers the competencies concerning with managing information security architecture
activities. This includes establishing a culture of designing and maintaining effective security architectures
that can be incorporated into information systems and networks through defining and implementing
organisational policies, standards and processes.
Performance Criteria
1. align security architectures to business needs in order that information systems conform to their
security profile
2. design and develop comprehensive information security architectures for complex network and
information systems in line with organisational requirements
3. design, implement and maintain the standards and techniques for information security
architectures in line with organisational procedures
4. ensure information systems are compliant with approved information security architectures and
recommend changes to them where they do not comply
5. ensure that existing information systems (including legacy systems) are migrated and/or integrated
to current secure architectures
6. justify to stakeholders the adoption of defined security architectures to reduce information risk
exposure for the organisation
7. advise others on all aspects of the development and implementation of information security
architectures
8. lead teams to implement standard security architecture models and roadmaps in line with
organisational requirements
9. modify security architectures to reflect new products and processes and align to changing business
needs
10. correctly identify the vulnerabilities and risks of existing and new information security architectures
and make recommendations to improve and update them
11. monitor the alignment of network and information systems with information security architecture
models and roadmaps
12. report the progress of information security architecture assignments to senior management and
other stakeholders
Knowledge and Understanding
1. what information is required to update and maintain information security architectures, models
and roadmaps
2. the sources of all current information that will be used during information security architecture
activities
3. the potential vulnerabilities and threats that may impact on the organisation's information assets
4. how to identify and select the most appropriate information security architecture models to
support the security requirements of a particular information system
5. the processes, tools and techniques for conducting information security architecture work
6. the range of issues associated with information security architecture activities
7. the impact of any legislation, regulation, internal and external standards relevant to the
organisation on information security architecture models and roadmaps
8. the implications of business change on information security architecture models and roadmaps
9. the relationship between security architecture and enterprise architecture
10. what are the issues associated with undertaking information security architecture work
11. the potential implications of information security architecture activities on the design and
development of information systems
12. the fact that information security architecture models and roadmaps are used to monitor the
effective alignment of information systems with the business security strategy and operating model
13. who are the sponsors of and stakeholders for information security architecture activities within the
organisation
14. who needs to authorize changes to information security architecture models and roadmaps
Direct secure development activities
TECHIS60361
The protection of information, services and systems relies on a range of technical and procedural activities,
often grouped in a framework. The framework will contain technical and logical, physical and process
controls that can be implemented across an organisation to reduce information and systems risk, identify
and mitigate vulnerability, and satisfy compliance obligations.
This standard covers the competencies concerned with directing security architecture activities. It includes
setting the strategy and policies for security architecture, and being fully accountable for successful
security architecture development activities and deliverables.
Performance Criteria
1. be fully accountable for information security architecture development in line with organisational
requirements
2. set the strategy, policies and standards relating to information security architecture
3. implement and update the procedures, tools and techniques relating to information security
architecture development activities as required
4. communicate with sponsors and stakeholders on the implications of information security
architecture activities for the wider business
5. set the resourcing strategy and correctly source appropriately skilled internal/external individuals
where necessary to undertake and/or manage information security architecture and roadmap
activities
6. effectively conduct security risk analysis as part of information systems scenario planning by
applying information security architecture models and roadmaps
7. advise others on all aspects of information security architectures including best practice and the
application of lessons learned
8. provide thought leadership on information security architecture, contributing to internal best
practice and to externally recognised publications, white papers
Knowledge and Understanding
1. how to source appropriately skilled individuals where necessary to undertake information security
architecture work
2. the most appropriate approaches and best practice to undertake architecture work
3. the processes tools and techniques to monitor the alignment of information security architecture
activities with all relevant legislation, regulations and external standards
4. how to assess the skills of internal/external individuals necessary to undertake information security
architecture and roadmap work
5. the range of existing and new information security models and roadmaps that influence strategic
business decision making and security planning
6. how to audit the outcomes of the information security requirements to ensure the security
architecture is proportional to the risks associated with a particular system
7. how to implement information security design reviews to validate the designs and architectures for
new information systems projects
8. the fact that individuals involved in information security architecture and roadmap activities need
to remain aware of the 'real life' business and technology operational activities to ensure their
work remains relevant
9. who needs to lead information security architecture assignments
10. how threat modelling can be applied to preventive information security design and architecture
practices
11. the design principles required that support embedding security into information security
architectures that are used to inform secure development activities
12. how to apply the lessons learned from prior and/or others' experience in
13. how to establish information security architecture models and roadmaps as a means of proactively
identifying opportunities for improvement
Contribute to secure software development activities
TECHIS60332
Developing secure software is a key element in defending applications against security risks.
This standard covers the application of secure development standards and practices. It also includes embedding of
preventative security measures into software development to reduce the risk of threats and vulnerabilities on
information systems and ensuring that testing demonstrates that security requirements are met.
Performance Criteria
1. follow the organisations secure software development lifecycle for embedding security controls
into software development
2. design software that avoids application coding security vulnerabilities
3. design and code strong authentication protections with secure software development in line with
organizational standards
4. utilise secure HTTP headers to prevent potential attacks in web applications in line with
organisational standards
5. review and incorporate security requirements into software development projects in line with
organisational standards
6. use and apply the approved tools and techniques for secure software development to line with
organisational standards
7. use appropriate security tools to test software applications and identify security defects in software
code, in line with organisational standards
8. resolve security related defects using secure coding techniques in line with organisational
standards
Knowledge and Understanding
1. what is meant by secure software development
2. why security needs to be built into software and information systems solutions
3. the secure development lifecycle and how to apply it
4. the types of application can be susceptible to security weaknesses
5. the attack types and software vulnerabilities that a software developer may encounter and need to
protect against
6. what are the common security controls available in secure software development to prevent
security incidents and to mitigate risk
7. the role of security testing in verifying the integrity of information systems solutions during
development
8. the tools and techniques that are required during secure development activities and how to apply
them
9. how to source and review the information security requirements for an information system or
software solution in development
10. the policies, internal/external standards and external certifications relating to information
assurance that any particular solution needs to comply with
11. the security artefacts and documentation that are required to evidence conformance to standards
and by internal and external auditors and certifiers of secure systems
12. the importance of ensuring that information assurance needs are considered as part of any
information system or solution at the earliest stages of the development lifecycle
13. the fact that building security into information systems or software solutions after the design and
development phases is expensive and time consuming
Carry out secure software development activities
TECHIS60342
Developing secure software is a key element in defending applications against security risks.
This standard covers the competencies concerned with conducting secure software development. This
includes implementing secure development standards and practices, translating information security
requirements into secure software. Also to recommend and implement a range of standard technical
security controls to make software solutions more resilient. And reducing the through the use of
"standard" security architectures which support secure software development activities.
Performance Criteria
1. apply the organisation's secure software development architecture to any particular software
development projects in line with organisational requirements
2. apply secure software development tools and techniques in line with organisational procedures
3. select and implement appropriate secure software test strategies in line with organisational
requirements
4. accurately identify information security requirements for software solution development
5. clearly communicate how security requirements need to be built into software solutions to
relevant stakeholders
6. verify that a software product or system meets its security criteria (requirements, policy, standards
& procedures)
7. critically review software solutions to ensure that they comply with any necessary internal and
external information security standards
8. conduct rigorous testing of all aspects of a new software solutions to identify information security
issues or risks
9. review secure software development techniques and implement any identified improvements
Knowledge and Understanding
1. the range of information security architectures that can be applied to secure information system
development
2. the internal and external security standards that need to be applied during secure software
development
3. how to implement secure software controls into secure software development using an
appropriate methodology
4. the appropriate information security testing that can be used to validate information system
security requirements are met
5. the approaches used to conduct a formal security assessment on a new software product or
information system
6. the benefits of „"designing in‟ security into software applications and information systems
7. the potential threats and vulnerabilities that may need to be considered within any software design
8. how to use and apply information security standards, architectures and frameworks
9. the importance of minimising the risk to information assets or systems through the use of standard
security architectures and models in secure software development
10. the potential issues and risks arising from a failure to comply with secure software development
requirements
11. the importance of ensuring that any secure software design and development work undertaken
aligns with the specified information security architecture
12. the importance of analysing potential threats associated with the software development approach
being taken prior to design work being undertaken
13. the internal and external factors that may impact on the effectiveness of secure software
development activities
14. the importance of educating system and solution developers, including third parties, in the need
for secure software development
Manage secure software development activities
TECHIS60352
Developing secure software is a key element in defending applications against security risks.
This standard covers the competencies concerning with managing secure development activities. This
includes establishing a culture of designing security aspects into software development through
implementing organisational policies, and defining and/or implementing secure development standards
and practices for embedding preventative security measures into software development practice.
Including managing resources activities and deliverables. Clear security standards will also contribute to an
organisational culture for secure software development and organisation-wide security awareness.
Performance Criteria
1. manage secure software development resources, activities and deliverables in line with
organisational requirements
2. define and maintain secure software development standards and practices to ensure the continued
protection of software against changing threats and risks
3. ensure that all software development activities are carried out as part of a secure software
development lifecycle
4. implement secure development practices to complex security requirements in line with
organisational requirements
5. ensure that software development teams understand the information security standards with
which they need to comply
6. develop and maintain secure software development tools and techniques in line with
organisational requirements
7. develop and maintain the organisation's secure software development architecture in line with
organizational requirements
8. review secure software designs to assess their security resilience in line with organisational
standards
9. perform formal security assessments on new software products to verify that they meet their
security requirements in line with organisational standards
10. review and improve secure design patterns for software development
11. define appropriate secure software change and error management processes in line with
organisational standards
12. clearly communicate to software developers how information security requirements need to be
built into particular software solutions or information systems being developed
13. select and implement appropriate software security test strategies to ensure compliance to
security requirements
14. develop and implement processes that maintain the required level of security of a software
product, or information system through its lifecycle
15. present information on secure software development processes and deliverables to a wide range
of sponsors, stakeholders and other individuals
16. advise others both internally and externally on all aspects of secure development activities
Knowledge and Understanding
1. how to manage secure software development activities
2. the range of appropriate security controls that can be incorporated into the development of
information systems
3. the policies and standards that relate to secure software development
4. how to develop standards and guidelines for secure software development
5. the need to communicate the importance of secure software development to ensure software
resilience to a wide range of sponsors and stakeholders
6. the need to review the standard software designs used in secure development
7. the range tools and techniques available to support secure software development activities and
how to apply them
8. how to respond to new threats and vulnerabilities through improved secure software development
tools and techniques
9. what is meant by a formal security assessment and how to perform them
10. the benefits of building security into software solutions and information systems
11. the potential issues and risks arising from a failure to comply with security requirements in
software development
12. what the internal and external factors that may impact on the effectiveness of secure development
activities are
13. the importance of ensuring that any secure design and development work undertaken aligns with
the security software development and wider security architectures
14. the need to communicate the deliverables produced by secure development activities to others
15. who needs to be provided with the deliverables for software development activities and when this
needs to happen
16. the need for monitoring the alignment of secure software development work with security
architecture models and roadmaps
Download