1 of 84

Introduction into Security

2022-05

2 of 84

GOOGLE�PRESENTATION�LINK

3 of 84

HOUSEKEEPING

  1. Make & share notes for you exam.
  2. Ask questions all the time, always.
  3. 50 min content, 10 min break, 50 min content

Location for optional �(open access) reading

QR Code to the Google Presentation of this slide

4 of 84

WHY

5 of 84

TOPICS

  1. Introduction of you and me
  2. What defines security
  3. Chaos Theorie (VUCA/ Cynefin)
  4. Foundation for Security �in Enterprise Design
  5. Foundation for Security in IT
  6. Security specific tools: �CIA & ROSI
  7. The big impact of GDPR (et al)�

Q&A during the session!

6 of 84

Multiple whitepapers�Thesis with 1500+ reads�40+ Blogs�Quoted in Books and Theses.

Consultancy for �7 Sectors,

30 Clients,

40+ Assignments�Infra to business strategy

@Edzob

(.com, LinkedIn, Twitter)

2021 - now Xebia

2006 - 2020 Sogeti

1992 - 2006 your IT guy

Research

ASc�Computer Science

2003

MSc�Enterprise�Architecture

2020

BSc�Business Information Systems

2006

PhD student�Information Security

2021-2027

Share

Apply

Edzo Botjes �Antifragility Architect

Variety Engineer

Trusted Advisor

https://www.edzob.com

Teaching Enterprise Architecture (MSc) at

Utrecht University

of Applied Sciences

2022 -

7 of 84

Edzo Botjes�Antifragility Architect

Variety Engineer

Trusted Advisor

https://www.edzob.com

Consultant @ Xebia�2021 -

Consultant @ Sogeti�2006 - 2020

Internships�2005 - 2006

8 of 84

My personal journey into security

9 of 84

10 of 84

The map is not the territory

11 of 84

SECURITY

12 of 84

How we define secure

Reality

Feeling

Secure

in-Secure

13 of 84

The story of two continuous forces

Reality

Feeling

Secure

in-Secure

14 of 84

The human factor

15 of 84

Innovation drives change in reality

16 of 84

Reality is unpredictable

1

2

Double Pendulum

17 of 84

The continuous security challenge

Reality

Feeling

Secure

in-Secure

Increasing Variety

Increasing Chaos

18 of 84

I

19 of 84

II

20 of 84

Thus we are in the age of VUCA

Volatility

Uncertainty

Ambiguity

Complexity

21 of 84

Security is all about how to deal with your VUCA world.

Next up a mental model to put VUCA in a corner,

then concrete ways to improve security in your organization(s).

22 of 84

NOT ALL IS CHAOS

23 of 84

Not all is chaos, Cynefin to make sense.

24 of 84

Not all is chaos, Cynefin to make sense.

Reductionistic

approach

Holistic

approach

25 of 84

Not all is chaos, Cynefin to make sense.

Reductionistic

approach

Holistic

approach

Probe - Sense - Respond

Act - Sense - Respond

Sense - Analyze - Respond

Sense - Categorize - Respond

26 of 84

BUILD A COMPANY�OR�JOIN A COMPANY

27 of 84

BOOK BINGO

28 of 84

How to build/ change a company

29 of 84

How to build/ change

a company

BOILS DOWN TO …

30 of 84

PEOPLE

PROCESS

TECHNOLOGY

31 of 84

All Enterprise Models�BOILS DOWN TO …

32 of 84

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

33 of 84

SECURITY �IN ALL LAYERS

34 of 84

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

35 of 84

Security is active on all layers

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

Reality

Feeling

Secure

in-Secure

36 of 84

Security is active on all layers, some examples

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

Business Modelling

Enterprise Design�Resilient Organisation

Antifragile Organisation

Business Continuity Management

Risk Management

Compliancy

Information Security

Cyber Security

IT Security

Application Security

Infrastructure Security

Physical Security

Operational Security

Asset Security

Network and Telecom Security

37 of 84

Security is active on all layers, and attracts people that like order

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

People trying to order all the security things:

  1. https://pauljerimy.com/security-certification-roadmap
  2. https://www.securecontrolsframework.com
  3. https://privacyplan.net/privacy-datasets/privacy-legislation-grid

38 of 84

Security is active on all layers, bla bla bla bla

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

39 of 84

EVERY COMPANY

40 of 84

Strategy

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

In the strategy layer, security is present as Risk Management.

Key Questions are:

  1. Where is my organisation strategy fragile? PEST/ SWOT
  2. How do I want to respond?

RESILIENCE

  • What is my risk appetite?

41 of 84

42 of 84

“The risk assessment and treatment process in ISO 27001 aligns with the principles and generic guidelines provided �in ISO 31000.”

27000: "risk is chance or probability of loss"

31000: "risk is the effect of uncertainty on objectives"

31000: “Risk management is the identification, assessment, and prioritization of risks (effect of uncertainty on objectives, whether positive or negative) followed by  effective and economic application of resources to minimize, monitor, control, and assure the probability and/or consequence of negative events or to maximize opportunities.“ 

43 of 84

Business that delivers via processes products and services

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

44 of 84

Business is responsible for the product life cycle

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

Plan

Create

Test

Deploy

Operate

45 of 84

Business that organizes itself via Enterprise Governance

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

Enterprise Governance

Structures

Processes

Relational Mechanisms

46 of 84

Three levels of defence for quality assurance in your business

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

47 of 84

Information needed in process to deliver products and services

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

48 of 84

Information quality can lead to for example: identity mix-ups

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

49 of 84

Best way to improve (information) quality is the Deming Circle

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

50 of 84

Information Systems needed to store, sort and deliver information

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

51 of 84

Improve IT systems (security) by Deming + Product LifeCycle

Plan

Create

Test

Deploy

Operate

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

52 of 84

Deming and Product LifeCycle combined as Software LifeCycle

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

53 of 84

Infrastructure where informations systems can run and live

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

54 of 84

Service Management is active on all layers

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

55 of 84

Service Management is active on all layers - Facilitate Buildings

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

56 of 84

Service Management is active on all layers - Facilitate Learning

Security

Business

Strategy

Information

Information Systems

Infrastructure

Service Management

57 of 84

SECURITY TOOLS

58 of 84

CIA(S) is old-school but still used in information security

59 of 84

CIA(S) is old-school but still used in information security

Confidentiality is improved by:

  1. Determine how public the information is.
  2. Apply access restrictions.�E.g. Key & Lock
  3. Apply read restrictions.�E.g. apply encryption
  4. Re-design so that information has a lower confidentiality rating -> this is a win!

60 of 84

CIA(S) is old-school but still used in information security

Confidentiality is improved by:

Start with using an Authenticator App and unique passwords �via a password manager.

61 of 84

CIA(S) is old-school but still used in information security

Integrity is improved by:

  1. Determine the impact of bad (data) quality.
  2. Apply fingerprinting to detect (data) manipulation.
  3. Apply access restrictions.�E.g. Key & Lock
  4. Re-design so that bad quality does not impact the function of the system. -> this is a win!

62 of 84

CIA(S) is old-school but still used in information security

Integrity is improved by:

Start with using by using a login before all information

63 of 84

CIA(S) is old-school but still used in information security

Availability is improved by:

  • Determine the impact of stuff (information) not available.
  • Apply redundant systems to become resilient.
  • Apply redundant processes to have options.
  • Re-design so that unavailability does not impact the function of the system. -> this is a win!

64 of 84

CIA(S) is old-school but still used in information security

Availability is improved by:

One source is no source.�Two sources is a start.�Always have options.

65 of 84

CIA(S) is old-school but still used in information security

Safety is about reducing risks of assets being in wrong hands.

  1. Design a threat-model on your manufacturing assets including your supply chain.
  2. Select trusted suppliers.
  3. Re-design your maintenance process.
  4. Re-design your manufacturing process to minimize impact.

66 of 84

CIA(S) is old-school but still used in information security

Safety is about reducing risks of assets being in wrong hands.

Assume you are already breached. This is known as zero-trust.

67 of 84

CIA(S) is old-school but still used in information security

Summary:

It is about trust!�

Who do you trust?

68 of 84

How to improve your personal security fitting to you own CIA(S)

69 of 84

ROSI = RETURN ON SECURITY INVESTMENT

BONUS CONTENT MSc

70 of 84

ROSI = RETURN ON SECURITY INVESTMENT

BONUS CONTENT MSc

71 of 84

EU LAW vs US LAW�KILLED THE (US) CLOUD

→ �BE CAREFUL WITH YOUR INVESTMENT

72 of 84

Public DPIA (NL) on Teams, Sharepoint, Azure AD, Zoom, etc

73 of 84

US Laws and EU Laws

Wikileaks

Patriot Act 1

Patriot Act 2

Cloud Act

Safe Harbor agr.

Privacy Shield agr.

GDPR

Data Act

Data Governance Act

74 of 84

Wikileaks & der Spiegel showed that the US act (2013/2014)

75 of 84

Schrems court case proved that US Law and EU law are no friends

“Maximilian Schrems (born 1987) is an Austrian activist, lawyer, and author who became known for campaigns [starting as a student] against Facebook for its privacy violations, including violations of European privacy laws and the alleged transfer of personal data to the US National Security Agency (NSA) as part of the NSA's PRISM program.” - Wikipedia

76 of 84

EU LAW VS US LAW�KILLED THE (US) CLOUD

→ BE CAREFUL WITH YOUR INVESTMENT

77 of 84

Witch, Please

Book 6, Ep. 5 | Security Theatre

78 of 84

To become more secure, make sense of your context and respond

Reality

Feeling

Secure

in-Secure

1

2

Double Pendulum

Probe - Sense - Respond

Act - Sense - Respond

Sense - Analyze - Respond

Sense - Categorize - Respond

79 of 84

emBRACE CHAOS

BONUS SLIDES

80 of 84

Stafford Beer - �Viable Systems Model

https://www.wikiwand.com/en/Viable_system_model

https://en.wikipedia.org/wiki/Stafford_Beer

BONUS CONTENT MSc

81 of 84

BONUS CONTENT MSc

Legal Entity

Legal Entity

Contract

Identity

Email/ Username

Personal Account

Attributes of the Identity

Non-Personal Account

Process

Information

Application

Infrastructure

Context via Attributes

Agreement between

Is defined by …

Is owned by …

Is identified by …

Is owned by …

Is used to identify …

Is used to identify …

Needs …

Stored in …

Stored on …

Is owner of …

Role/ Function in the process …

Role/ Groups

Part of …

Defines the …

Access to �information �(CRUD)

Access to �functionality

Access to �service �(CRUD)

IAM REFERENCE MODEL

Organization

Person

Organization

Person

Is owner of …

Is owner of …

Is identified by …

82 of 84

TRANSACTION AS FABRIC OF OUR REALITY

https://www.pronto-lectures.org/docs/glossary/

https://www.researchgate.net/publication/351461134_The_Evolution_of_DEMO

BONUS CONTENT MSc

83 of 84

View on reality determines your scientific approach

https://www.pronto-lectures.org/docs/glossary/

https://www.researchgate.net/publication/351461134_The_Evolution_of_DEMO

BONUS CONTENT MSc

Tips, for who is going to do their master, �regarding viewpoint on reality:

  1. Read-up on post-modernism and the alternatives to it, and
  2. plato.stanford.edu is a great resource.

84 of 84

Affordance is the new way to look at Business & IT

http://www.janrecker.com/this-is-research-podcast/affordances-is-the-new-tam/�https://podcasts.apple.com/ie/podcast/affordances-is-the-new-tam/id1553028563?i=1000538416337

Jan Recker wrote a great book on MSc research

& is responsible for a great overview on research methodologies: https://aisnet.org/page/ISResearch

BONUS CONTENT MSc