Feed on
Posts
Comments

Category Archive for 'Security Architecture'

PSD, Payment Service Directive is a very interesting directive from EU regarding opening up for payment flows all over EU. Read more here: http://register.consilium.europa.eu/pdf/en/07/st03/st03613-re02.en07.pdf This of course will create changes in the current systems on how money is tranfered within EU today. From my point of view the possible need for changes in the security […]

Read Full Post »

Even if I really appriciate WSSRA and have had quite a lot of use for it, sometimes I run into issues where it is not as clear as one could hope. The description and relationship of the following words: Threat, Threat Agent, Vulnerability, Exploit and Risk are, in the big picture, correct and you understand […]

Read Full Post »

During my years within the IT industry working with security I have taken pride in never just say no, but say no and give an explanation. By doing that my no later on could be a yes because the customer could explain what they wanted and I could help dem create a secure solution. Sadly […]

Read Full Post »

Security professionals shudder and CSO:s turn their heads away when Shadow IT is mentioned. This is a part of IT that is not regulated and therefor is dangerous… or is it? I agree that Shadow IT indeed could pose a threat if for example some employees or managers opens up corporate information for the whole […]

Read Full Post »

I had a rather long discussion with a good friend and former collegue today regarding simplicity in security. It is a well know fact that when your solution is to complex you probably have done it wrong. But the issue he had was that if you do not implement a security solutions so it is […]

Read Full Post »

Now and then I get engaged in discussion regarding if security should be driven by business or by risk. Meaning that either security issues should be risen when business wants a new function or changes in an existing function or security should only be risen as an effect of riskanalysis. This is not a simple […]

Read Full Post »

You now have the value of every asset. Lets start with the hard stuff: Deciding what assets to protect first. Even if it sounds simple to just make a list from certain criterias the dependencies between resources have made this a lot harder. Virtualization will not make it easier. WSSRA SA states that factors you […]

Read Full Post »

The process for determine the assests to protect is named Asset Assessment and Valuation. First thing is to identify the assets you have. In my last post I defined the criterias for identifing assets. Lets take a closer look on the assets and determine what parts of an asset that really needs to be protected. […]

Read Full Post »

IT-Architecture is all about having a common language to describe an IT-environment. WSSRA SA defines a few words that are commonly used throughout the document: Assets, People, Process. Assets are divided into two groups: Data asset and Tier Asset. Data assets are the information stored within your databases, your spreadsheets and your worddocuments. That is […]

Read Full Post »

Last few weeks I have found quite a lot of companies hiring consultants with knowledge about WSSRA, Windows Server System Referency Architecture. Even if I like the concept of architecture it could be qute hard to grasp sometimes for an inexperienced person. During the following weeks I will write short notes about key concepts regarding […]

Read Full Post »

« Prev - Next »