text
stringclasses
5 values
source
stringclasses
1 value
SABSA-at-Work  1. Copyright © The SABSA Institute 1995-2018. All rights reserved. The SABSA Institute C. I. C Registered Address: 126 Stapley Road, Hove East Sussex, BN3 7FG, United Kingdom Email: info@sabsa. org Web: https://www. sabsa. org Registered in England & Wales, Company Number 08439587 SABSA-at-Work™: SW100-Cyber Security: How can SABSA® help your business? Case Study: The WIDGETT Company The company develops and sells a package of software and consulting called Workflow Integrated Development and Generation for Enterprise Transformation Toolkit (WIDGETT). Alice, the CEO, started the company a few years ago. She had just left a career in one of the large consulting companies to start up her own entrepreneurial business. Alice is attending the Cyber UK conference organised by the National Cyber Security Centre (part of GCHQ). She hopes that she can get some insights into how to manage the cyber security issues that are part of building and running a digital business such as hers. At the conference she finds herself sitting next to Bob at lunchtime and they are now engaging in conversation. It's a chance encounter. Let's listen in to what they have to say. Alice: “Hello Bob. It says on your badge that you are a SABSA consultant. What does that mean?” Bob: “Well I'm pleased you asked me that Alice. I'm always looking to tell people about SABSA. It's a framework for building information security architectures, which these days pretty much equates to cyber-defence strategy. Alice: “Well I'm here to try to figure out what I should be doing for cyber defence in my own company, so give me the pitch Bob. Why should I think about using SABSA? I know there are no silver bullets so your story had better be good to get my interest. ” Bob: “Ok, well that's quite a challenging way for us to begin but I'll try to keep it short and sweet. I'll give you the five main reasons why SABSA can help people in managing their business cyber risks. Are you ready Alice?” Alice: “Yes Bob-shoot!” SABSA Concept 1: Risk is a two-sided coin: Opportunity for Gain and Threat of Loss in a single concept Bob: “Doing business of any kind is about taking calculated risks. Every decision you make and everything you do has risk involved in it. You can never avoid risk in general, only the specific risks you don't want to take. The wise thing to do is to pick and choose your risks within what we call your 'risk appetite'. That is, how much downside risk you are willing to take in order to make gains and reap the rewards. ” Alice: “OK. That matches my own experience in starting a new business. I saw an opportunity but recognised there were multiple reasons why it might fail. Fortunately, it's doing well. ” Bob: “I'm pleased to hear that Alice. Obviously, starting a new business, as you did, is about taking some of those calculated risks. These are both upside (the opportunities for gain) and downside (the threats that might result in losses). You have to take a holistic view of the entire business lifecycle to understand your true risk balance. The balanced risk approach is conceptually similar to a cost/benefit analysis. Risk has to do with uncertainty of outcome of
TSI-SW100-Cyber-Security-How-SABSA-Can-Help-Your-Business-1.pdf
2. Copyright © The SABSA Institute 1995-2018. All rights reserved. The SABSA Institute C. I. C events. However, there's a subtly here, in that the uncertainty factors are not necessarily the same for both opportunities and threats. They have different sources. This means that you need to start top-down in your business analysis, looking at the things that really matter to you. Identify the things you most want to protect, such as your business reputation and the ability to carry on your business operations uninterrupted, your intellectual property, keeping the cash flow positive, and making a profit. ” Alice: “Ok, I get that, but what has all this got to do with cyber security? SABSA Concept 2: Assets at risk-the Business Value Chain. Bob: “More and more business is being done online. Cyberspace, the Internet and the web are just new ways of supporting a business in how it creates its products and services and how it markets, sells, and supports them in the field. In the modern world the Internet offers so many opportunities to do business, but of course there are dangers-cyber threats. The problem that many people have is that they believe that cyber security is just about having the right technical solutions. They don't see the connection to their primary business activity, which is creating business value, whatever that means for them in their business world. ” Alice: “So you're suggesting that cyber security needs more than technology? I must admit that has never occurred to me before. ” Bob: “Yes. Cyber security is a sociotechnical thing. It involves people, processes and culture as well as pure technology. It's important to focus on the 'people thing' as well as the technology. You have different players (stakeholders) in your business scenario, including yourself, your staff; your technology services suppliers, and your customers. Possibly there are others too. Each stakeholder has a different view because they are positioned at a different viewpoint. They see the same business but from a different angle. I liken it to a valley landscape, surrounded by hills, and the various stakeholders occupy positions on various hilltops, or even down by the river. They all see the same valley, but their view of it depends on their viewpoint. It's a good analogy for understanding how the different players will have different priorities, all of which need to be satisfied for everyone to be happy. ” Alice: “Oh, now I begin to see the connection-that a business is a sociotechnical thing too. ” In SABSA we call these Capabili es Figure 1: Porter's Value Chain Model
TSI-SW100-Cyber-Security-How-SABSA-Can-Help-Your-Business-1.pdf
3. Copyright © The SABSA Institute 1995-2018. All rights reserved. The SABSA Institute C. I. C Business Capabili es Business Processes Business Services Applicaons (Logical Informa on Services) ICT Infrastructure (Physical Networks/Pla orms/Storage) Business Risk Management Cyber Risk Management Technical Components (Standards, Products & Tools) Service Management People: Roles, Responsibili es Knowledge, Skills, Competencies Support Services & Processes Business Value Chains BAP BAP BAP BAP BAP BAP BAP BAP BAP ã The SABSA Institute 1995-2016. All rights reserved. Figure 2: The SABSA Business Stack TM: Risk View Bob: “Yes. SABSA borrows the idea from Porter's value chain modeli shown in Figure 1. This model views the running of a business as being a series of activities that comprise a 'system'. The system has a hierarchical series of processes that require you to manage resources efficiently and effectively to optimise business performance. According to Porter, the optimisation depends upon whether you want your business output to be 'cheap and cheerful' (low cost to a mass market) or high quality and specialist (for a highly differentiated product or service in a niche market). Both 'low cost' and 'highly differentiated' are possible business strategies, but you need to be clear which one you go for. However, successful mixed business models are also possible, especially with the new Internet businesses. SABSA helps you to analyse your value chain top-down by breaking it into a series of layers (Figure 2). That's why SABSA is such a useful approach for making risk decisions. Do they add value or not? Is it 'worth the risk' or not. ” Alice: “Yes I get that. We aim WIDGETT at a highly specialised, niche market, competing to be the best in class. So, tell me how SABSA can help me with my cyber risk management. ” Bob: “Cyber-attacks put your whole business at risk, so you have to think from the top down- protecting your value creating activities-in order to know what sort of cyber defences you need. Porter defines the primary activities that make up your value chain, along with some support activities that every company needs to keep going. What do you think are your primary activities?” Alice: “We're a knowledge company, using our expertise to build software and offer consulting services to support it. That means that our inbound logistics are all about acquiring the right people. Our operations are software development, both in the design of the functionality, and building robust code, so I can see immediately the link to cyber defence. Our outbound logistics are delivery of the software over the Internet-more cyber defence needed, and our marketing is mainly via our website. Sales are consultancy led, sometimes on-site, but often by email and teleconferencing, and our services are product support and consulting using the same remote processes. I'm beginning to get it now. We should build our cyber defences in the lower layers of the SABSA Business Stack™, but we should define the requirements for what assets we want to protect in those top layers labelled 'business risk management'. ” SABSA Concept 3: Top-down Decomposition of the Business Value Chain.
TSI-SW100-Cyber-Security-How-SABSA-Can-Help-Your-Business-1.pdf
4. Copyright © The SABSA Institute 1995-2018. All rights reserved. The SABSA Institute C. I. C Bob: “Correct! That's why SABSA can help you because it decomposes your value chain top-down. It's not really significant that you are a knowledge company. If you were a manufacturing company making ordinary widgets (forgive the pun!) you would have plenty of cyber technology in your automated, remotely controlled, manufacturing processes. SABSA analysis of the value chain can help any type of business whether it's commercial or public service. ” “The important thing is to know what your business performance targets are, and SABSA has a special way to do that called Business Attribute Profiling ™. This process breaks down your value chain into a series of measurable attributes that are the key characteristics of your business, each one with a performance target. In SABSA your performance targets have a flip side too- they are expressions of your risk appetite-how much risk you are prepared to take to do business. ” “As you move down the SABSA Business Stack doing your analysis, the next level down inherits and re-interprets attributes from the layer above, according to what's going on at that level. So, you begin to reveal the inter-dependencies between the various parts of your business, which in most cases can be a quite complex 'system of systems'. ” “For example: You will want to protect your intellectual property (IP). So, at the top value chain level (because producing IP is your primary activity-your 'crown jewels' as it were) you might define an attribute called 'IP protected'. At the next level (Capabilities) you might have a linked attribute called 'Access Restricted'. At the Business Processes level, it might be 'Identity & Access Managed'. At the Business Services level, it might be 'Access Controlled', and then as you go down the stack, by the time you reach the Logical level, the matching attribute might simply be 'Confidential' and at the Infrastructure level it might be 'Encrypted'. Each attribute is derived from the one above and contributes to supporting the higher-level tree structure of attributes. ” “We use the Business Attributes Profile (BAP) as a set of 'proxy assets' because they conceptualise the real assets at risk (the value chain and its derivatives) and represent the upside of risk (the opportunity). Then we do a threat assessment against those assets to make sure you can meet your performance targets in the face of a cyber-attack. ” Alice: “So, you say that cyber security isn't just a technology thing, but something that we should drive from the highest business goals and objectives-the business value chain. I had never thought of it that way before, but of course it makes perfect sense. ” “I would like to use these ideas to help grow my business, especially in grasping opportunities for using cyber technologies to add business value whilst managing the cyber threats within my 'risk appetite' as you call it. That's a new term to me but I see what you mean-how much 'cyber risk' can I take and how should I manage the level so I can use new digital technologies. So how can I go about that using SABSA?” SABSA Concept 4: Business Attribute Profiling and Security Performance Measurement Bob: “SABSA is a systems approach to cyber risk management. You can express any business process, from the top-level value chain, right down through all the layers, to the management of the IT infrastructure and the cyber defence tools and technologies that you use, as a set of key characteristics that SABSA calls Business Attributes, as I just explained. Starting at the top business layer (the value chain), I'm guessing that you would base some of your attributes on being highly competitive in your niche market, being in control of the business, protecting the reputation of your brand, and so on. You probably don't need more than half a dozen to characterise your key performance requirements at that level. However, you need to decide on a measurement approach, a specific metric, and a performance target for the metric for each of your key attributes. As an example, you might measure your competitiveness by the level of
TSI-SW100-Cyber-Security-How-SABSA-Can-Help-Your-Business-1.pdf
5. Copyright © The SABSA Institute 1995-2018. All rights reserved. The SABSA Institute C. I. C uniqueness of your offering. The specific metric might be the number of unique selling points, and the performance target might be to create and maintain at least three USPs versus competing products and services. Am I right?” Alice: “Yes you are. I can see straight away that one of my USPs would be Secure Online Support. I can also see that a successful cyber-attack could damage our brand reputation, and that it would definitely trash any sense of being in control. It would be really helpful to have a way to measure and balance the downside risks of a cyber-attack against the business benefits of using digital technologies. An approach that provides that balanced view will be valuable in itself. So far, I've been confused by the cyber threats one reads about all the time. I hadn't realised that it's a balancing act that I can learn to manage. ” SABSA Concept 5: Two-way traceability Bob: “The really helpful thing about the SABSA approach is that as you go down the stack from layer to layer, the higher layer makes demands on the layer below. It's a supply and demand model. The lower layer must inherit the requirements from above and supply them through a series of attributes that serve the needs from above. When you get down into the nuts and bolts of cyber defence technology you can be sure that you derived the attributes that characterise those layers from the very highest business drivers. We call this SABSA Two-Way Traceability ™. You ensure that all your high-level attributes in the value chain itself are matched by lower level attributes that contribute to a complete set of cyber security controls and business enablers. You also justify your detailed cyber security solutions-when people ask 'Why are we doing it this way?' you can trace back to top of the stack to find the business drivers that you are servicing. That's why it's 'two-way'-providing both a completeness check and justifying the expenditure. ” “So, there you have it Alice: the five most important reasons why people like using SABSA to plan their cyber security strategy. There's a lot more detail published in various white papers and blogs on The SABSA Institute web site. They also have a worldwide programme of SABSA training and certification. ” Alice: “Wow! That is impressive. I would love to be sure we are balancing our investment in cyber defence and the rest of the business in the most effective and efficient way. Thank you, Bob, for all that. I think I need to get some official SABSA training to follow this up. I think using SABSA will help me take the business forward and at the same time have measured confidence that our cyber-defence is fit for purpose. It was good to meet you today. Do you have a business card?” i Porter, Michael E., "Competitive Advantage". 1985, Ch. 1, pp 11-15. The Free Press. New York.
TSI-SW100-Cyber-Security-How-SABSA-Can-Help-Your-Business-1.pdf
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
0
Edit dataset card