Professional Documents
Culture Documents
Unit: ITNET202A
Assessment Type Report
Assessment 2
Number
Type: Case Study
Weighting 30%
A. Task:
You are to provide a security architectural design for a new, internet-based bankthat you are
setting up, having been granted a banking license
legislation recently passed by the Federal Government.
Because you are dealing with a bank, several security concerns at various levels need to be
addressed in your architecture:
1
Your design needs to deal with enterprise architectural issues relating to application security,
platform/OS security, network security, and storage security.
The decision has been made to run the IT operations in a Cloud environment.
You will need to make reasonable assumptions about sizing, capacity, etc. of the various IT
components, and you need to provide a design for best security practice, i.e. cost is less of
anissue than having security exposures and weaknesses.
2
2. Detailed (SABSA logical level) security architecture. This will include specific details of what
security services you will provide, what networking you will provide, what application systems
you will be protecting, what tools you will be using.
3
Indicative example only:
3. Detailed design (SABSA physical level) of your main processing site(s), irrespective of the
use oftheCloud. This will include location, security equipment, networking devices, storage
sizing, management tools, operational components for the detailed security architecture.
4. Costing estimates (both labor, hardware, and software, both for implementation and
operation)
5. Planning estimates with enough detail to show estimates at the equipment installation level
6. Resourcing estimates
For these latter components, you would benefit from using the SABSA Framework for Security
Service Management.
C. Approach:
Use the SABSA framework as a guide for your work products. Concentrate on the How, Who
and Where (Process, People, and Location) columns. You will have to do some research about
how an organization like a bank would be running its IT systems and what they would consist of.
4
D. Deliverable work products:
Included in the set of work products you need to produce are:
1. Business requirements and risk assessments on which you will base your designs.
2. Use cases -
systems,and subsystems, with special emphasis on security interactions.
3. High-level security architectural diagrams and explanatory notes. See point 1. above
under components.
4. High-level logical network diagrams - These should show what security systems you
planto implement, where they are located about the network, and other IT components. These
should be accompanied by descriptions of the detailed security architectures they depict.
5
5. Description of the security services you are planning to provide, why, and where they will
be located about the IT systems and networks.
6. Equipment lists describing what equipment you will be implemented to provide these
security services.
6
E. Submission:
Due date: (Week 11) 15th May 11:55 pm
Format: report, suggested length 20-25 pages (incl. diagrams and tables), in a standard report
format, in a paper-based format.
F. Assessment:
This work is worth 30% of the final subject mark but will be marked out of 100.Marks
e. Consistency between high-level architecture, detailed architectures, and detailed designs -10
f. Relevance of your architectures and designs to business requirements and use cases - 15