122 ◾ Security Strategy: From Requirements to Reality
Today defense in depth really becomes a question of what you have direct control over (your
enclave), how that environment relates to other enclaves and the supporting infrastructure, cou-
pled, of course, with the threats that are present in each instance. Today’s computer environments
require more than technological controls. People and operational processes are critical to overall
security and must always be taken into consideration. In the past we were concerned primarily
with what was coming into our environment; today, we must be equally concerned with what is
going out.
Information Environments
Today we fi nd three common information environments: in-house, hybrid, and hosted. In-house
is a localized computing environment (enclave) consisting of people, technology (i.e., end-user
systems, servers, communications systems, etc.), and operational practices that are under the con-
trol of a single authority governed by organizational policy. On the other side of the spectrum is
the hosted environment consisting of people, technology, and operations that are under the con-
trol of an external authority governed by contract. is is not to say that hosting environments
are not governed by internal organizational policies; they undoubtedly are, but the customer’s
security requirements are seldom the same as the provider’s, and these diff erences are usually
specifi ed in the service contract. It is also important to note that the hosting environment is also
an enclave; to the provider it is a localized computing environment under the control of a single
authority. e hybrid environment combines in-house and hosted services to form an environ-
ment with multiple control authorities and multiple governing vehicles (policies and contractual
agreements).
Attached to these environments are two other elements that must be considered for objectives
identifi cation: networks and supporting infrastructure. Networks provide data transport between
enclaves. Network service providers also consist of people, technology, and operational practices
(which may or may not be under a single authority) governed by contractual agreement(s). e
supporting infrastructure includes all the organizational capabilities that provide support for
the information processing environment, including human resources, training, and purchasing.
Each of these elements has diff erent information security requirements and very diff erent security
objectives.
Threats
Each environment is also subject to a number of diff erent threats including natural disasters,
physical hazards, and human malfeasance. Natural disasters include fl oods, earthquakes, light-
ning, solar fl ares, fi res, and other naturally induced hazards. Physical hazards are human-induced
threats, including structural failures (e.g., building collapse), machinery, and equipment failures
(e.g., ventilation systems), water damage from plumbing or fi re suppression systems, explosions,
hazardous material spills, and so on. Human malfeasance includes acts of sabotage, terrorism, spy-
ing, hacking, riots and looting, criminal enterprises, corrupt offi cials, and disgruntled employees,
as well as damages from careless or accidental actions.
Natural disasters are typically addressed by business continuity planning (BCP) and/or disas-
ter recovery planning (DRP) objectives. ese objectives may include some physical hazards, but
TAF-K11348-10-0301-C008.indd 122TAF-K11348-10-0301-C008.indd 122 8/18/10 3:08:40 PM8/18/10 3:08:40 PM