Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Making Security a "Business Enabler"
Economic pressures compel businesses and organizations to look for technology solutions that reduce costs and improve efficiency. They seek to do this, of course, without sacrificing the quality and productivity of the existing system. The heightened risk of security not only relates to the security of the assets involving buildings and people, but also relates to the security of the organizational technology and its managed business processes. Ironically, investing in security is often considered as a capital investment and is not considered as a contributor to business productivity. More interestingly, IT architects and developers focus on the technical elegance of new security technologies as a defensive mechanism to protect the applications and infrastructure without realizing the potential cost benefits from them. From an IT management and business investor's perspective, security infrastructure and solutions for a business case is not justifiable without reference to how security contributes to overcoming technological and economical obstacles and risks faced by an organization. With security gaining significant importance in every business and organizational process, it is often challenging to explain how security addresses an organizational goal such as improving operational efficiency or reducing costs. Equally difficult to explain is how security contributes to Return On Investment (ROI). Let's take a look at some examples of security measures and how they function as "business enablers" in an organization. Case 1Justifying Identity and Access Management
Identity and access management provides compelling business benefits by reducing costs, risks, and complexity in the enforcement of organizational security policies and practices. In a nutshell, an identity management solution facilitates an organization by the following:
Case 2Justifying Proactive Security Approaches
McLean and Brown in their ROI study for security (refer to [McLeanBrown] for details) discuss an ROI estimation model for security architecture investment. Table 1-1 shows a slightly modified version to illustrate potential ROI with implementation of end-to-end security for J2EE and Web services applications. In this example, a medium-sized firm intends to estimate the cost of implementing J2EE and Web services security architecture using single sign-on architecture. The firm has some existing security infrastructure in place. To simplify the sample scenario, we present a list of assumptions following the table. We have used a three-year cost estimate to compute the ROI per year. Note that the financial exposure is likely to be greater than the security investment, and we estimate an ROI of $683,333 per year. Thus, it is justifiable to implement a proactive security architecture design using J2EE and Web services technologies.
Assumptions
Case 3Justifying Security Compliance
Security compliance is a strong business enabler in terms of enhancing consumer confidence and improving the operational efficiency of an organization's information systems and processes. It also ensures an organization will follow an auditable process and use reporting mechanisms that help protect them from errors and fraudulent practices. For example, in January 2004 the Bank of Scotland was fined about $2.5 million for failing to keep proper records of customer identification as stipulated by the UK Financial Services Authority's money laundering regulations [ExpressComputer]. By achieving compliance, the organization can meet its responsibilities as specified by the government regulations and avoid issues related to negligence and compliance failuresfines, sanctions, and jail terms for corporate executives and board members. Achieving security compliance also helps organizations to do the following:
Compliance with regulatory requirements often drives the need for implementing effective security procedures and identity management solutions that provide proof of compliance. It also improves organizational productivity and customer trust. |
Категории