SOA security Fundamentals, part 1th: Developing a roadmap to protect large SOA applications

Source: Internet
Author: User
Tags new set require requires

10 steps to achieve better SOA security

Introduction: This series provides a roadmap to secure implementation of a service-oriented architecture (service-oriented architecture, SOA). A total of three parts of this series, this is the 1th part of this article, which will cover a 10-step process to help you work from building an SOA security team to creating an effective requirements gathering process. In part 2nd, we'll see how to create an abstract design, and part 3rd will discuss test cases.

I recently had the opportunity to participate in an SOA project-specifically, a security implementation of a large automatic control system. I read as many books on the subject as I could, I studied it online, and even sent emails to my former colleagues and friends to ask about the relevant issues. To my surprise, there was no roadmap for the step-by-step process I needed to help me achieve the goal of securing a large SOA application.

Finally, I had to create one of these processes myself. I have developed a simple process that contains 10 steps, as described in this article.

Step 1th Select the right team

The task of migrating large, critical infrastructure applications to SOA is daunting. It is even more difficult to protect it, and it is often necessary to adopt a new perspective to recognize it-and may even require a new set of security personnel to carry out the relevant work. Most security teams have very little training in SOA or even programming. A common approach for security authorities is to send out requests and hope that the Organization will be able to follow them. So the 1th step (which is often the hardest part) is to make sure that you have the right team.

The team should have an owner who has knowledge of security and software architecture and, ideally, knowledge of SOA. Like the Enterprise Architect, the secure Enterprise Architect (Security Enterprise Architect,sea) will be responsible for creating the overall SOA security model to integrate all the different security requirements at each granularity level. Sea will enter the SOA governance board, together with the Enterprise Architect (Enterprise Architect,ea) to ensure that all SOA implementations meet the requirements of security requirements and the security business analyst who is responsible for creating the artifacts needed throughout the process Business ANALYST,SBA) and Security systems Engineer (Systems Engineers, SSE) team to guide. Sea will also be responsible for working with programmers who write security service code and security system testers who test them before deploying the system.

Step 2nd Create a detailed project plan

For a large SOA system, step 2nd requires high-level management understanding that it will not be possible to integrate it into the old security model by improving the new SOA: this does not work. If the focus from the outset is on traditional security mechanisms, such as firewalls, intrusion detection systems, and security monitoring, this will be completely out of the reach of SOA security implementations. You will be responsible for making sure that everyone is aware of what is necessary to make the SOA security implementation clear by developing detailed project plans and budgets.

You need to be aware that any transformation to the SOA model involves inherent security contradictions: the more obvious the SOA features of the system, the worse its security. The process of transforming the current system into an SOA through service-oriented modeling and analysis technology requires the formation of business-design-related documentation. The use of formal languages that relate business design to information systems usually only illustrates the situation of contradictory, inefficient, and complex non-SOA systems. However, this complexity masks most of the problems, making it difficult for those looking for opportunities to disrupt the enterprise system to find these vulnerable links. When these systems are decomposed and SOA is enabled, the architecture that the malicious user faces is simpler and more easily compromised.

SOA advocates may deny this, but those responsible for securing the system know that open systems with centralized control points and web enabled are inherently less secure and require more responsive and flexible methods. There is no way to circumvent this problem, project planners (often assigning an appropriate set of tasks to SOA security) must keep in mind that SOA security requires detailed project planning and budgeting to allocate the necessary time for security teams to analyze and understand the new challenges of SOA implementation.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.