Interior Page Icon

Architect to Protect

Creating a Foundation for Resiliency



Overview

The design principles for architectural foundations enable resilience-enhancing technologies to be integrated with security and other infrastructure services in a cost effective way. This document describes how to apply segmentation, coordinated defense and diversity resiliency techniques.

Applying Segmentation to Limit Adversary Impacts

Segmentation - physical or logical separation or isolation of resources based on trustworthiness and criticality - can limit the spread of destructive malware in an enterprise information infrastructure. Separation or isolation can be physical or logical, and predefined or dynamic.

Priorities for Immediate Action with Segmentation

The top priorities for segmentation are

Applying Coordinated Defense to Share Situational Awareness and Collaborate

Coordinated Defense - managing multiple, distinct mechanisms adaptively and in a coordinated way - can defend critical resources against adversary activities. There are two major implementation approaches to coordinated defense.

Priorities for Immediate Action with Coordinated Defense

The top priorities for Coordinated Defense are:

Applying Diversity to Impede Adversary Actions

Diversity - using a heterogeneous set of technologies (e.g., hardware, software, firmware, protocols) and data sources - can minimize the impact of attacks and force adversaries to attack multiple different types of technologies. There are several synergistic implementation approaches to diversity:

Priorities for Immediate Action with Diversity

Preparing for the Future

Segmentation, like business continuity planning, relies on an understanding of how mission or business processes rely on cyber resources, and on the functional dependencies among those resources. That understanding enables an organization to determine the relative criticality of its resources, and thus to define an enterprise architecture in which physical or virtual enclaves are - or can be - separated based on the importance of defending them. However, mission or business processes evolve over time, and thus so do dependencies. Therefore, enterprise architects and systems engineers need to maintain an ongoing dialog with mission or business process owners.

Similarly, coordinated defense relies on the coordination between operators, administrators and managers of component systems in order to consistently defend against and recover from attacks. This coordination enables an organization to apply the defenses at the most effective points and keep critical resources functioning through adverse events. As mission and business processes evolve, and as more information about the adversary becomes available, operators, administrators and managers of component systems need to maintain an ongoing dialog with each other.

Diversity can increase due to non-resiliency business and mission pressures as well as an effort to increase resiliency. Resilient diversity can leverage this business related diversity but should not be limited to this. Understanding the organization's diversity and maintaining an accurate representation is key to managing the enterprise security consistently.

A growing chorus of experts recommend making conscious risk management decisions that include resilience and defensibility, recognizing that such recommendations run counter to the trends toward integration, convergence, and cloud computing. Enterprise architects and systems engineers should be prepared for a pendulum swing, in which they are asked whether and how they have managed risks of malware permeating the enterprise information infrastructure. These resiliency techniques are primary strategies for limiting the spread of malware, detecting it early and recovering from the attack quickly.

See Key Concepts and Terms for definitions

Previous Activity Back to Menu Next Activity