Security,
Enterprise Architecture,
Software Engineering and �Language Philosophy - �Why this is a great marriage.
Wicca @ Xebia @ 2023-07-26 by Edzo Botjes
Multiple whitepapers�Thesis with 1500+ reads�40+ Blogs�Quoted in Books and Theses.
Consultancy for �7 Sectors,
41 Clients,
50+ Assignments�Infra to business strategy
@Edzob
(.com, LinkedIn, Twitter)
1992 - 2006 your IT guy
2006 - 2020 Sogeti
2021- now Xebia
Research
ASc�Computer Science
2003
MSc�Enterprise�Architecture
2020
BSc�Business Information Systems
2006
PhD student�Information Security
2021-
Share
Apply
Teaching Enterprise Architecture (MSc) at �Utrecht University �of Applied Sciences�2022 -
Edzo Botjes
Organisational Resilience Architect
Antifragility Architect
Trusted Advisor
https://www.edzob.com
Wicca 20230726
Language & Security
Edzo Botjes
Organisational Resilience Architect
Antifragility Architect
Trusted Advisor
https://www.edzob.com
Consultant @ Xebia�2021-
Consultant @ Sogeti�2006 - 2020
Internships�2005-2006
Wicca 20230726
Language & Security
Two worlds meet
Groningen�…
2010�2013
Python/ Data Science
Language Philosophy
Wicca 20230726
Language & Security
PERSPECTIVE AND INFORMATION
Perspective and information
https://twitter.com/DrNeenaJha/status/1338105837684977664
Wicca 20230726
Language & Security
Perspective and information
https://twitter.com/TanMohammedMD/status/1337865483446587392
Wicca 20230726
Language & Security
Perspective and information
https://en.wikipedia.org/wiki/Rabbit%E2%80%93duck_illusion
https://scitechconnect.elsevier.com/lessons-from-the-dress-the-fundamental-ambiguity-of-visual-perception
Wicca 20230726
Language & Security
PERCEPTION AND INFORMATION
Reflections and information
https://twitter.com/NicoleBeckwith/status/1277236284470280195/photo/1
Wicca 20230726
Language & Security
Reflections and information
https://writing.exchange/@XanIndigo/109966588561594572
Wicca 20230726
Language & Security
The colors in the rectangles are the same
https://writing.exchange/@XanIndigo/109966588561594572
Wicca 20230726
Language & Security
Visualisation and information
https://www.ritsumei.ac.jp/~akitaoka/index-e.html
https://twitter.com/jimhejl/status/1452814882701824001
https://twitter.com/AkiyoshiKitaoka/status/1568102162064113669
Wicca 20230726
Language & Security
https://www.ritsumei.ac.jp/~akitaoka/index-e.html
Rotating Snakes
https://www.linkedin.com/posts/rafaelgiraldotenorio_entarch-activity-6681201385402376192-4MNK
Wicca 20230726
Language & Security
Language,
Post Structuralism
& CHAOS
The two faces of chaos
Botjes, Edzo. (2020). Defining Antifragility and the application on Organisation Design (1.0) [Zenodo]. https://doi.org/10.5281/zenodo.3719389
Wicca 20230726
Language & Security
All is chaos
Subjective and Objective Chaos �& The continuous challenge
MSc thesis: https://zenodo.org/record/3719389 // IEEE article: https://www.researchgate.net/publication/354321606 // Security: https://www.ted.com/talks/bruce_schneier_the_security_mirage�https://www.flaticon.com/free-icon/organization_3985164?related_id=3985166
Reality
Feeling
Secure
in-Secure
Security
Software Engineering
Organisations
Wicca 20230726
Language & Security
Language philosophy to influence perception
MSc thesis: https://zenodo.org/record/3719389 // IEEE article: https://www.researchgate.net/publication/354321606 // Security: https://www.ted.com/talks/bruce_schneier_the_security_mirage
Context
Discourse
Post Structuralism
Wicca 20230726
Language & Security
EXAMPLES
The map is not the terrain
Wicca 20230726
Language & Security
Appendix 1 - �Organisational Learning
Learning Organisation (Senge) �+ Mental Models (Hestenes)
Senge, P. M. (1990). The Fifth Discipline: The Art and Practice of the Learning organisation. A Currency book. Doubleday/Currency, New York, NY, USA.
Hestenes, D. (2010). Modeling theory for math and science education. In Modeling students’ mathematical modeling competencies, pages 13–41. Springer.
Wicca 20230726
Language & Security
Appendix 2 - �Cyber Security and Enterprise Architecture Models
SUMMARY
Content
three models to tackle change and governance
Definition of Security
https://www.ted.com/talks/bruce_schneier_the_security_mirage
DIE trump's CIA
https://www.slideshare.net/sounilyu/distributed-immutable-ephemeral-new-paradigms-for-the-next-era-of-security�https://www.nccoe.nist.gov/publication/1800-26/VolA/index.html
WHAT IS AN ENTERPRISE
What is an Enterprise/ Organization
Dietz, J. L., et al, (2013). The discipline of enterprise engineering. https://www.researchgate.net/publication/263068480
Hoogervorst, J. A. (2017). Foundations of Enterprise Governance and Enterprise Engineering https://www.springer.com/gp/book/9783319721064
Daft, R., Murphy, J., and Willmott, H. (2010). Organisation Theory and Design.http://www.worldcat.org/oclc/761007858
Wicca 20230726
Language & Security
An Enterprise is exposed to constant change
Wicca 20230726
Language & Security
Enterprise Governance
Governance, is the mutual explicit agreements upon the process (who does what), �the structures (who decides) and relational mechanisms (how are people appointed etc).
De Haes, S. and Van Grembergen, W. (2015). Enterprise Governance of Information Technology https://www.springer.com/gp/book/9783319145464
De Haes, S., Van Grembergen, W., Joshi, A., and Huygh, T. (2019). Enterprise Governance of Information Technology https://www.springer.com/gp/book/9783030259174
Botjes 2020, Defining Antifragility and the application on Organisation Design https://doi.org/10.5281/zenodo.3719389
Wicca 20230726
Language & Security
Enterprise Alignment
Henderson, J. C., & Venkatraman, N. (1993). Strategic alignment: Leveraging information Technology for transforming organisations https://pdfs.semanticscholar.org/e840/2b65103442e2517982e5e3eb330f72886731.pdf https://ieeexplore.ieee.org/document/5387398
Jerry Luftman & Rajkumar Kempaiah An Update on Business-IT Alignment: “A Line” Has Been Drawn https://eds.p.ebscohost.com/eds/pdfviewer/pdfviewer?vid=1&sid=815940a6-41e8-4b9c-84c4-f57d97fbab4f%40redis
Wicca 20230726
Language & Security
WHY IS AN ENTERPRISE
2023-06�Cyber Resilience
Enterprise Goal
Goldratt, E. M., Cox, J., & Whitford, D. (1992). The goal: A process of ongoing improvement. http://www.worldcat.org/oclc/855170263
Goldratt, E. M. (1994). It's not luck. Great Barrington, Ma: North River Press. http://www.worldcat.org/oclc/937082420
Sinek, S. (2013). Start with why: How great leaders inspire everyone to take action. http://www.worldcat.org/oclc/906697355�https://www.danielstillman.com/blog/abstraction-laddering-for-problem-framing
https://www.danielstillman.com/blog/reflections-over-resolutions
Nietzsche/ Frankel/ Sinek
Hayakawa
Wicca 20230726
Language & Security
Enterprise Goal translated from Why to How
Wicca 20230726
Language & Security
WHAT IS RESILIENCE
2023-06�Cyber Resilience
Enterprise Goal & Risk Management
Wicca 20230726
Language & Security
Risk Management states we are in a VUCA world�and we need resilience to deal with the unexpected
Volatility
Uncertainty
Ambiguity
Complexity
Risk Management ISO 31.000
https://doi.org/10.1016/j.bushor.2014.01.001
https://hbr.org/2014/01/what-vuca-really-means-for-you
https://link.springer.com/book/10.1007/978-3-319-16889-0
https://en.wikipedia.org/wiki/Volatility,_uncertainty,_complexity_and_ambiguity
Wicca 20230726
Language & Security
Resilience is responding to events
Martin-Breen and Anderies, 2011) http://opendocs.ids.ac.uk/opendocs/handle/123456789/3692
Taleb, N. N. (2012). Antifragile: Things That Gain from Disorder. Random House, New York, NY, USA http://www.worldcat.org/oclc/851345873
Botjes, Edzo. (2020). Defining Antifragility and the application on Organisation Design (1.0) [Zenodo]. https://doi.org/10.5281/zenodo.3719389
Wicca 20230726
Language & Security
Three types of resilience
Martin-Breen and Anderies, 2011) http://opendocs.ids.ac.uk/opendocs/handle/123456789/3692
Taleb, N. N. (2012). Antifragile: Things That Gain from Disorder. Random House, New York, NY, USA http://www.worldcat.org/oclc/851345873
Botjes, Edzo. (2020). Defining Antifragility and the application on Organisation Design (1.0) [Zenodo]. https://doi.org/10.5281/zenodo.3719389
Wicca 20230726
Language & Security
WHY IS RESILIENCE RELEVANT
2023-06�Cyber Resilience
2023-06�Cyber Resilience
2023-06�Cyber Resilience
2023-06�Cyber Resilience
2023-06�Cyber Resilience
2023-06�Cyber Resilience
WHY IS CYBER�RESILIENCE RELEVANT
2023-06�Cyber Resilience
Events impact business continuity
https://www.wsj.com/articles/colonial-pipeline-ceo-tells-why-he-paid-hackers-a-4-4-million-ransom-11621435636�https://www.bankinfosecurity.com/lawsuits-allege-colonial-pipeline-had-inadequate-cybersecurity-a-16928
Wicca 20230726
Language & Security
Information and Information Systems (IT) are the value enablers of an organisation.
Timmers, P. (2022). Cybersecurity and Resilience from a Strategic Autonomy Perspective. Decoding EU Digital Strategic Autonomy, 137.
https://liberalforum.eu/wp-content/uploads/2022/06/Decoding-EU-Digital-Strategic-Autonomy_ELF-Study_Techno-Politics_vol.1-2.pdf#page=54
Wicca 20230726
Language & Security
EU legislation is demanding (as also the US legislation)
At a glance: A guide to the EU’s new digital package January 2023 Guillaume Couneson�https://www.linklaters.com/en/insights/blogs/digilinks/2022/november/eu---dga-data-act-nisd2-dsa---confused
Relevance
Caution
The practitioner field is scrambling in adding
the EU policies NIS2, DSA,
the market policies as 27001,
The national policies as BIO,�Into one “spreadsheet”..
This is not viable.
There is no conclusive list of patterns/ policies to apply to stay compliant with all these legislation.
Wicca 20230726
Language & Security
WHY RESILIENCE
STAYS RELEVANT
2023-06�Cyber Resilience
Things will happen.
Wicca 20230726
Language & Security
PERSPECTIVE AND INFORMATION
Perspective and information
https://twitter.com/DrNeenaJha/status/1338105837684977664
Wicca 20230726
Language & Security
Perspective and information
https://twitter.com/TanMohammedMD/status/1337865483446587392
Wicca 20230726
Language & Security
Perspective and information
https://en.wikipedia.org/wiki/Rabbit%E2%80%93duck_illusion
https://scitechconnect.elsevier.com/lessons-from-the-dress-the-fundamental-ambiguity-of-visual-perception
Wicca 20230726
Language & Security
PERCEPTION�AND�INFORMATION
Reflections and information
https://twitter.com/NicoleBeckwith/status/1277236284470280195/photo/1
Wicca 20230726
Language & Security
Reflections and information
https://writing.exchange/@XanIndigo/109966588561594572
Wicca 20230726
Language & Security
The colors in the rectangles are the same
https://writing.exchange/@XanIndigo/109966588561594572
Wicca 20230726
Language & Security
Visualisation and information
https://www.ritsumei.ac.jp/~akitaoka/index-e.html
https://twitter.com/jimhejl/status/1452814882701824001
https://twitter.com/AkiyoshiKitaoka/status/1568102162064113669
Wicca 20230726
Language & Security
https://www.ritsumei.ac.jp/~akitaoka/index-e.html
Rotating Snakes
https://www.linkedin.com/posts/rafaelgiraldotenorio_entarch-activity-6681201385402376192-4MNK
Wicca 20230726
Language & Security
The map is not the terrain
Wicca 20230726
Language & Security
WHY RESILIENCE
STAYS RELEVANT
2023-06�Cyber Resilience
Connections lead to chaos
Wicca 20230726
Language & Security
The two faces of chaos
If a situation is chaotic depends on the perspective of the observer, �this is the subjective part of chaos.
1
2
Double Pendulum
If a situation contains over a certain amount of connections, then it is impossible to predict the future, �this is the objective part of chaos.
https://en.wikipedia.org/wiki/Double_pendulum �https://en.wikipedia.org/wiki/Rabbit%E2%80%93duck_illusion
https://www.linkedin.com/posts/rafaelgiraldotenorio_entarch-activity-6681201385402376192-4MNK
https://www.linkedin.com/posts/complexity-academy_complexitytheory-activity-6625721108249354241-MsJi
Wicca 20230726
Language & Security
The two faces of chaos
Botjes, Edzo. (2020). Defining Antifragility and the application on Organisation Design (1.0) [Zenodo]. https://doi.org/10.5281/zenodo.3719389
Wicca 20230726
Language & Security
FOCUS ON CYBER RESILIENCE
2023-06�Cyber Resilience
The continuous security challenge
Reality
Feeling
Secure
in-Secure
MSc thesis: https://zenodo.org/record/3719389 // IEEE article: https://www.researchgate.net/publication/354321606 // Security: https://www.ted.com/talks/bruce_schneier_the_security_mirage
Wicca 20230726
Language & Security
The continuous security challenge
Reality
Feeling
Secure
in-Secure
Increasing subjective chaos
Increasing objective
chaos
MSc thesis: https://zenodo.org/record/3719389 // IEEE article: https://www.researchgate.net/publication/354321606 // Security: https://www.ted.com/talks/bruce_schneier_the_security_mirage
Wicca 20230726
Language & Security
The power of the many
http://ars.userfriendly.org/cartoons/?id=20021110
https://twitter.com/TheRealSpaf/status/1401555550480080901/photo/1
https://cloudsecurityalliance.org/artifacts/state-of-cloud-security-risk-compliance/
Wicca 20230726
Language & Security
The fragility of the many
http://www.jklossner.com/humannature
https://web.archive.org/web/20051130114833/http://ars.userfriendly.org/cartoons/?id=20021110
https://cloudsecurityalliance.org/artifacts/state-of-cloud-security-risk-compliance/
Wicca 20230726
Language & Security
We need to measure Insecurity not security
https://www.researchgate.net/publication/359821764_Researching_Sensemaking_and_Situational_Architecting_A_First_Step_Towards_a_Guide_for_Sensemaking_Situational_Architecturing_Designing_and_Changing_Enterprises
We design security via functional and non-functional requirements.�We obtain insecurity by affordance.
Wicca 20230726
Language & Security
Affordance
a use or purpose that a thing can have, that people notice as part of the way they see or experience it: In design, perceived affordance is important — that is, our implicit understanding of how to interact with an object.
Wicca 20230726
Language & Security
Innovation thrives business value
MSc thesis: https://zenodo.org/record/3719389 // IEEE article: https://www.researchgate.net/publication/354321606 // �Security: https://www.ted.com/talks/bruce_schneier_the_security_mirage�Innovation: Huber, D., Kaufmann, H., and Steinmann, M. (2017). Innovation: An Abiding Enigma, pages 11–19. Springer International Publishing, Cham. https://books.google.nl/books?id=rzckDwAAQBAJ
Wicca 20230726
Language & Security
SENSEMAKING
2023-06�Cyber Resilience
Cynefin framework to make sense
https://en.wikipedia.org/wiki/Cynefin_framework
Botjes, Edzo. (2020). Defining Antifragility and the application on Organisation Design (1.0) [Zenodo]. https://doi.org/10.5281/zenodo.3719389
Wicca 20230726
Language & Security
Cynefin framework to make sense
Holistic
approach
Reductionistic
approach
Correlation: seen�Causality: known
Correlation: seen�Causality: unknown
Correlation: unseen�Causality: unknown
Correlation: seen�Causality: known
https://en.wikipedia.org/wiki/Cynefin_framework
Botjes, Edzo. (2020). Defining Antifragility and the application on Organisation Design (1.0) [Zenodo]. https://doi.org/10.5281/zenodo.3719389
Wicca 20230726
Language & Security
Sensemaking OODA
https://xebia.com/blog/monitoring-levels-and-monitoring-maturity/
https://en.wikipedia.org/wiki/OODA_loop
Wicca 20230726
Language & Security
MEASURE, INFLUENCE �and �BECOME RESILIENT
2023-06�Cyber Resilience
How to measure Resilience
Balázs Nagy
Wicca 20230726
Language & Security
Monitoring
•Monitoring Tips
1.Tip - log not only for the expected, but also for the unexpected.
2.Tip - log system metrics into another database as the application log data.
3.Tip - have the log environment in another context as the application and infrastructure the logs generate.
4.Tip - determine why you are logging so that you can decide what to log.
•Monitoring Levels
1.Metric data from the infrastructure level.
2.Metric data from the application component level.
3.Functional log data from the application component level.
4.Meta-data from the application component level.
5.Meta-data from the user defined business transaction level.
6.Meta-data from (synthetic) end-users.
•Monitoring Maturity
1.Gather data.
2.Transform data into information.
3.Transform information into events.
4.Automate the response to events.
•
https://xebia.com/blog/monitoring-levels-and-monitoring-maturity/
Wicca 20230726
Language & Security
Measuring Automation of Continuous Delivery
Deployment Frequency
Lead time for Changes
Change failure Rate
Time to Restore Service
DORA Metrics Software Delivery Performance
Wicca 20230726
Language & Security
How to influence Resilience
Senge, P. M. (1990). The Fifth Discipline: The Art and Practice of the Learning organisation. A Currency book. Doubleday/Currency, New York, NY, USA.
Hestenes, D. (2010). Modeling theory for math and science education. In Modeling students’ mathematical modeling competencies, pages 13–41. Springer.
Wicca 20230726
Language & Security
What to design to become resilient
Per resilience type, different attributes are relevant to achieve that type of resilience.
Botjes, Edzo. (2020). Defining Antifragility and the application on Organisation Design (1.0) [Zenodo]. https://doi.org/10.5281/zenodo.3719389
Botjes, E., van den Berg, M., van Gils, B., & Mulder, H. (2021, September). Attributes relevant to antifragile organizations. In 2021 IEEE 23rd Conference on Business Informatics (CBI) (Vol. 1, pp. 62-71). IEEE.
Wicca 20230726
Language & Security
HOW TO �LEARN
2023-06�Cyber Resilience
Mental Model and reality
Dietz, J., & Hoogervorst, J. (2017). Foundations of enterprise engineering. TEE-00 https://www.researchgate.net/publication/320353420_Foundations_of_Enterprise_Engineering
Hestenes, D. (2006). Notes for a modeling theory. In Proceedings of the 2006 GIREP conference: Modeling in physics and physics education, volume 31, page 27. University of Amsterdam, Amsterdam https://www.semanticscholar.org/paper/Notes-for-a-Modeling-Theory-of-Science%2C-Cognition-Hestenes/066bbeae4d25ade2d16055886e330159bf3a2312
Hestenes, D. (2010). Modeling theory for math and science education. In Modeling students’ mathematical modeling competencies, pages 13–41. Springer.
If you don’t know, then you can not see it.
Wicca 20230726
Language & Security
Hierarchy of Competence
https://en.wikipedia.org/wiki/Four_stages_of_competence
Before you can improve you need to see what can be improved.
Wicca 20230726
Language & Security
Rational Action Model
Fishbein, M. and Ajzen, I. (2011). Predicting and changing behavior: The reasoned action approach. Psychology press.�https://en.wikipedia.org/wiki/Reasoned_action_approach (image uploaded by Gjalt-Jorn Peters, feedback loop is new)
Behavior is the result of many internal believe systems and internal capabilities.
Wicca 20230726
Language & Security
Morphogenic Social Systems
Archer, M. S. (1995). Realist social theory: The morphogenetic approach. Cambridge university press.
Behavior is the result of external factors like culture, other people behavior.
Wicca 20230726
Language & Security
Team Topologies
https://scaledagileframework.com/organizing-agile-teams-and-arts-team-topologies-at-scale/
Wicca 20230726
Language & Security
HOW TO DESIGN FOR RESILIENT
2023-06�Cyber Resilience
How to design for resilience
Wicca 20230726
Language & Security
Design Process
…..
Wicca 20230726
Language & Security
Design Process
https://www.designreview.byu.edu/collections/from-chaos-to-clarity-in-the-design-process
Wicca 20230726
Language & Security
Plan-Do-Check-Act Deming Circle
https://en.wikipedia.org/wiki/PDCA �https://en.wikipedia.org/wiki/Product_lifecycle �http://www.hec.unil.ch/aosterwa/PhD/Osterwalder_PhD_BM_Ontology.pdf
Wicca 20230726
Language & Security
Product Development Lifecycle (PDCA instance)
https://cio-wiki.org/wiki/Product_Lifecycle_Management �https://en.wikipedia.org/wiki/Product_lifecycle
Wicca 20230726
Language & Security
DevOps Lifecycle (PDCA instance)
https://www.linkedin.com/pulse/governance-cloud-world-david-das-neves �https://www.linkedin.com/pulse/devsecops-paradoxon-david-das-neves �https://xebia.com/the-shift-left-fallacy
https://awkwardgen.com/devops-infinity-loop-for-beginners/
Wicca 20230726
Language & Security
Product Development (PDCA instance)
Gartner, 2017 Enterprise Architecture and Technology Innovation Leadership Vision for 2017,
https://www.gartner.com/binaries/content/assets/events/keywords/enterprise-architecture/epaeu17/enterprise_architecture_and__tech-innovation.pdf
Wicca 20230726
Language & Security
NIST Cybersecurity functions (PDCA instance)
Wicca 20230726
Language & Security
HOW TO DESIGN FOR VALUE
2023-06�Cyber Resilience
Value delivery
Wicca 20230726
Language & Security
Essential business transaction
Value is always delivered between two
Actors and in 5 phases.
Ask the following key questions:
https://www.pronto-lectures.com/docs/glossary/
Wicca 20230726
Language & Security
Business Model Canvas
https://en.wikipedia.org/wiki/Business_Model_Canvas �http://www.hec.unil.ch/aosterwa/PhD/Osterwalder_PhD_BM_Ontology.pdf �https://cardboardit.com/2018/10/understanding-your-business-through-the-business-model-canvas
Wicca 20230726
Language & Security
Value proposition canvas
https://assets.strategyzer.com/assets/resources/the-value-proposition-canvas.pdf
Wicca 20230726
Language & Security
Enterprise Success
Osterwalder, 2015 - 5 tools for new business success, https://www.strategyzer.com/blog/5-tools-for-new-business-success
Ries, 2011 - The Lean Startup, https://www.goodreads.com/book/show/10127019
�
Wicca 20230726
Language & Security
HOW TO DESIGN AN ENTERPRISE FOR VALUE
2023-06�Cyber Resilience
Enterprise Organization
Causal loop of external forces (blue), organizational strengths (red) and architectural contributions (green)�https://e476rzxxeua.exactdn.com/wp-content/uploads/2022/04/DYA-whitepaper-Architecture-In-This-New-World-We-Live-In.pdf
Wicca 20230726
Language & Security
Enterprise Goal
What a company wants to be and the values guiding the journey.
The purpose of a company.
Vision
Mission
Strategy
Goals & Objectives
How a company will achieve its vision and mission (in the long run).
The things a company needs to do to realize the strategy.
Greefhorst & Proper: A Practical Approach to the Formulation and Use of Architecture Principles
Wicca 20230726
Language & Security
The 13 (normalized) Enterprise Goals
De Haes, S. and Van Grembergen, W. (2015). Enterprise Governance of Information Technology https://www.springer.com/gp/book/9783319145464
De Haes, S., Van Grembergen, W., Joshi, A., and Huygh, T. (2019). Enterprise Governance of Information Technology https://www.springer.com/gp/book/9783030259174
Wicca 20230726
Language & Security
Balanced Business Scorecard & Goal Maps
Science direct papers on Balanced Business Scorecard: https://www.sciencedirect.com/topics/computer-science/balanced-scorecard
Bizzdesign on designing a BBSC https://support.bizzdesign.com/display/knowledge/Modeling+a+Balanced+Scorecard
Archimate Goal Map https://circle.visual-paradigm.com/goal/
Wicca 20230726
Language & Security
Enterprise Governance
Enterprise Governance
Structures
Processes
Relational Mechanisms
COBIT 5 and COBIT 2019
Wicca 20230726
Language & Security
Enterprise Architecture
This is a meta-model of how to divide an enterprise in layers that each have their own description of coherence and design language.
Security
Business
Strategy
Information
Information Systems
Infrastructure
Service Management
Created by Edzo Botjes https://edzob.medium.com/where-does-enterprise-and-solution-architecture-fit-e3a5ae26c750
Wicca 20230726
Language & Security
Enterprise Architecture
Per layer certain topics are captured within.
Service Management and Security are domains relevant on all layers and depend on the coherence between the layers.
Security
Business
Strategy
Information
Information Systems
Infrastructure
Service Management
Organization
Products & Services
business processes
Information
Application
Netwerk
Middleware
Platform
Data
Created by Edzo Botjes https://edzob.medium.com/where-does-enterprise-and-solution-architecture-fit-e3a5ae26c750
Wicca 20230726
Language & Security
Enterprise change – a conscious choice
Security
Business
Strategy
Information
Information Systems
Infrastructure
Service Management
Security
Business
Strategy
Information
Information Systems
Infrastructure
Service Management
Security
Business
Strategy
Information
Information Systems
Infrastructure
Service Management
Security
Business
Strategy
Information
Information Systems
Infrastructure
Service Management
Security
Business
Strategy
Information
Information Systems
Infrastructure
Service Management
Security
Business
Strategy
Information
Information Systems
Infrastructure
Service Management
Created by Edzo Botjes https://edzob.medium.com/where-does-enterprise-and-solution-architecture-fit-e3a5ae26c750
Wicca 20230726
Language & Security
Three roles of architects – and their focus
SAFe https://www.scaledagileframework.com/agile-architecture/ https://www.scaledagileframework.com/enterprise-architect/
Wicca 20230726
Language & Security
Architects are responsible for creating insight in the coherence between the layers.
SAFe https://www.scaledagileframework.com/agile-architecture/ https://www.scaledagileframework.com/enterprise-architect/
Wicca 20230726
Language & Security
The Antifragile Organization
“The agile organization is dawning as the new dominant organizational paradigm. (2017)”
https://en.wikipedia.org/wiki/Antifragile_(book)
https://www.mckinsey.com/business-functions/organization/our-insights/the-five-trademarks-of-agile-organizations
Wicca 20230726
Language & Security
HOW TO DESIGN AN ENTERPRISE FOR DIGITAL
2023-06�Cyber Resilience
Digital transformation to a digital platform
Ross, J. W., Beath, C. M., & Mocker, M. (2019). Designed for digital: How to architect your business for sustained success. The MIT Press.
Wicca 20230726
Language & Security
HOW TO MANAGE
RISK
2023-06�Cyber Resilience
RISK Management
Wicca 20230726
Language & Security
Risk Management & Value creation
To identify the risk for the value creation of an organization, you need to know the risk and impact at each transition.
Actors
Data
Systems
Value
Requested by
Delivered by
Produce with
Requested with
Stored in
Provided by
Wicca 20230726
Language & Security
ROSI = RETURN ON SECURITY INVESTMENT
https://essay.utwente.nl/79757/1/Casano_MA_EEMCS.pdf
https://www.enisa.europa.eu/publications/introduction-to-return-on-security-investment/at_download/fullRepor
https://d2k0ddhflgrk1i.cloudfront.net/TBM/Over%20faculteit/Afdelingen/Engineering%20Systems%20and%20Services/People/Professors%20emeriti/Jan%20van%20den%20Berg/MasterPhdThesis/PANCHIT-MASTER-THESIS.pdf
Wicca 20230726
Language & Security
Risk Management ISO 31000
https://www.iso.org/obp/ui/#iso:std:iso:31000:ed-2:v1:en
https://en.m.wikipedia.org/wiki/ISO_31000
https://pecb.com/whitepaper/iso-31000-risk-management--principles-and-guidelines
https://theriskacademy.org/is0-31000-iso-27005/
Wicca 20230726
Language & Security
Risk Management ISO 27005
https://www.iso.org/standard/75281.html
https://en.wikipedia.org/wiki/ISO/IEC_27005
https://www.researchgate.net/figure/ISO-27005-Risk-Management-Framework-7_fig1_263023688
Wicca 20230726
Language & Security
Risk Management -3 lines of defense
Wicca 20230726
Language & Security
HOW TO DETERMINE
RISK
2023-06�Cyber Resilience
Threat models
Wicca 20230726
Language & Security
Affordance, Construction, Functionality
https://www.researchgate.net/publication/359821764_Researching_Sensemaking_and_Situational_Architecting_A_First_Step_Towards_a_Guide_for_Sensemaking_Situational_Architecturing_Designing_and_Changing_Enterprises
Wicca 20230726
Language & Security
Threat Model Process
https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
Wicca 20230726
Language & Security
Threat Model Model
https://xebia.com/blog/threat-modeling-without-a-diagram/
Wicca 20230726
Language & Security
Data Flow Diagram
https://learn.microsoft.com/en-us/windows-hardware/drivers/driversecurity/threat-modeling-for-drivers
Wicca 20230726
Language & Security
STRIDE
https://developer.ibm.com/articles/threat-modeling-microservices-openshift-4/
Wicca 20230726
Language & Security
USE CASE vs ABUSE CASE
https://cheatsheetseries.owasp.org/cheatsheets/Abuse_Case_Cheat_Sheet.html
Wicca 20230726
Language & Security
Sites relevant to Secure Solution Development
Wicca 20230726
Language & Security
LAYERS IN
TECHNOLOGY
2023-06�Cyber Resilience
Technology
Wicca 20230726
Language & Security
Make the dependencies explicit
Virtual Machine
Network & Power
Storage
Database
Middleware
Application
Operating System
HyperVisor
Virtual Network
Compute/CPU
Application 3-Tier Layer
Virtual Machine Layer
Virtualization Layer
Hardware Layer
Configuration
Created by Edzo Botjes 2012
Wicca 20230726
Language & Security
Make the dependencies explicit
Integrity
Access
Virtual Machine
Network & Power
Storage
Database
Middleware
Application
Operating System
HyperVisor
Virtual Network
Compute/CPU
Application 3-Tier Layer
Virtual Machine Layer
Virtualization Layer
Hardware Layer
Configuration
Tools/ Services
Data / Interfaces
(DevOps) LifeCycle Management
Dev & Ops Environment
Created by Edzo Botjes 2012
Wicca 20230726
Language & Security
… as a Service
Muratore, L., Lennox, B., & Tsagarakis, N. G. (2018, October). Xbotcloud: A scalable cloud computing infrastructure for xbot powered robots.
In 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (pp. 1-9). IEEE.
https://www.researchgate.net/publication/327700356
Wicca 20230726
Language & Security
HOW TO SECURE
TECHNOLOGY
2023-06�Cyber Resilience
Principles for secure design
Wicca 20230726
Language & Security
ISO 25010 – SW Quality Attributes
How to determine the quality of a certain IT solution?
Functional Suitability
Functional completeness�Functional correctness�Functional appropriateness
Compatibility
Co-existence
Interoperability
Performance Efficiency
Time-behaviour
Resource utilisation
Capacity
Portability
Adaptability
Installability
Replaceability
Security
Confidentiality
Integrity
Non-repudiation
Accountability
Authenticity
Reliability
Maturity
Availability
Fault tolerance
Recoverability
Maintainability
Modularity
Reusability
Analyzability
Changeability
Modification
Testability
Usability
Appropriateness
Recognisability
Learnability
Operability
User error protection
User interface aesthetics
Accessibility
https://nl.wikipedia.org/wiki/ISO_25010
https://iso25000.com/index.php/en/iso-25000-standards/iso-25010
Wicca 20230726
Language & Security
Software Design Process
https://commons.wikimedia.org/wiki/File:RUP_disciplines_greyscale_20060121.svg
Wicca 20230726
Language & Security
Test process in the old world.
Performance Test
Load �Test
Penetration �Test
Created by Edzo Botjes 2012
Wicca 20230726
Language & Security
VIEWS ON
SECURITY
2023-06�Cyber Resilience
Defining security
Reality
Feeling
Secure
in-Secure
https://www.ted.com/talks/bruce_schneier_the_security_mirage
Wicca 20230726
Language & Security
Information Security
https://en.wikipedia.org/wiki/Information_security “Bachelor course introduction into Security” https://zenodo.org/record/6580724
Wicca 20230726
Language & Security
Information Security ISO 27001
….
Wicca 20230726
Language & Security
CIA(S)
https://www.securecontrolsframework.com�https://en.wikipedia.org/wiki/Information_security#Key_concepts
Wicca 20230726
Language & Security
DIE overCIA
Confidentiality
Availability
Integrity
CIA
Immutable
Ephemeral
Distributed
DIE
…..
CIA - https://www.nccoe.nist.gov/publication/1800-26/VolA/index.html
CIA - https://en.wikipedia.org/wiki/Information_security
DIE – 2019 - https://www.slideshare.net/sounilyu/distributed-immutable-ephemeral-new-paradigms-for-the-next-era-of-security�DIE – 2021 - https://www.rsaconference.com/library/Presentation/USA/2021/death-to-cia-long-live-die-how-the-die-triad-helps-us-achieve-resiliency
DIE – 2020 - https://www.cisa.gov/sites/default/files/publications/Daily_Keynote_with_Sounil_Yu_508pobs.pdf
DIE over CIA - https://www.techtarget.com/searchsecurity/feature/Experts-say-CIA-security-triad-needs-a-DIE-model-upgrade
Wicca 20230726
Language & Security
NIST Cybersecurity functions
…..
Wicca 20230726
Language & Security
VIEWS ON
SECURE SOFTWARE DEVELOPMENT LIFECYLE
2023-06�Cyber Resilience
Cyber defense matrix
https://github.com/OWASP/www-project-cyber-defense-matrix
https://owasp.org/www-project-threat-and-safeguard-matrix
Wicca 20230726
Language & Security
DevSecOps Playbook
https://xebia.com/blog/getting-started-with-devsecops-the-culture
https://github.com/6mile/DevSecOps-Playbook/blob/main/images/devsecops-controls.jpg
Wicca 20230726
Language & Security
BRACE Secure Software Development Lifecycle meta-model
BRACE states that in every step of the product development process, from plan/design up and until operations, security enablers (topics) needs to be addressed.
BRACE provides generic epics and generic user stories, to be refined by each team involved, to improve the security of the product development process.
It is contextual to which maturity level it makes sense to evolve towards, based on a risk assessment (cost vs benefits)
The content of the epics and user stories is based on experience and inspired by available SSLDC Models.
Wicca 20230726
Language & Security
BRACE Secure Software Development Lifecycle meta-model
BRACE https://pages.xebia.com/brace-a-metamodel-on-secure-product-development?ref=Xebia
Wicca 20230726
Language & Security
BRACE https://pages.xebia.com/brace-a-metamodel-on-secure-product-development?ref=Xebia
Wicca 20230726
Language & Security
BRACE https://pages.xebia.com/brace-a-metamodel-on-secure-product-development?ref=Xebia
Wicca 20230726
Language & Security
BRACE security enablers – generic Azure user stories to be refined by individual teams
BRACE https://pages.xebia.com/brace-a-metamodel-on-secure-product-development?ref=Xebia
Wicca 20230726
Language & Security
Other SSDLC MODELS
Wicca 20230726
Language & Security