TBM Framework & Taxonomy

 View Only
  • 1.  Question: Categorizing Network Security by Resource Tower

    Posted 11-03-2023 11:30

    Should the costs (labor/non-labor) to provide network security be classified as Resource Tower=Network or Resource Tower=Security & Compliance? 

    In ATUM 4.0...

    • The definitions of Network are silent on security being in or out of scope
    • The definition of Security & Compliance/Security includes:
      • "Responding to security breaches and providing real-time operational security such as vulnerability scanning, managing firewalls, intrusion prevention systems, and SIEM"
      • but also "The implementation actions defined by security policies are not included...and are part of the respective towers where the actions take place (e.g. Compute, Storage, Network)"

    Does anyone have examples of activities that would be included in Security & Compliance as "real-time operational security" vs. what would be in Network as an "implementation action"?

    Is there any work in the definition of ATUM 5.0 that will make these explicit?



    ------------------------------
    Amy Foltz
    Product Owner, TBM
    Chevron
    San Ramon TX
    +1.925.842.1000
    ------------------------------


  • 2.  RE: Question: Categorizing Network Security by Resource Tower

    Posted 11-06-2023 19:37

    My interpretation is that any activity or expense related to Network enablement/maintenance inclusive of securing the network environment is included in the network tower. As examples: mitigating security breaches by applying patches are included in the Network tower.  Network management and engineering, including planning for cybersecurity, are also included int the network tower cost. Provisioning and governance to ensure security standards and policies are incorporated into the Network design and development processes, as well as the day-to-day operations should be included in the network tower cost. As well as cybersecurity architecture, network boundaries definition, access controls, interconnections, active monitoring, automation, reliable detection, and proper procedures and resources to respond to incidents, tactics, techniques, and procedures to stop, mitigate, and respond effectively to network incidents.

    The security tower includes cost associated to defining and maintaining current security policies. Providing technical standards and best practices for developing a strong
    network security posture resulting in a defensible, resilient network.

    See https://dodcio.defense.gov/Portals/0/Documents/Library/CSResourceReferenceGuide.pdf



    ------------------------------
    Juan Jose Jarillo
    Customer Success Advisor
    Apptio
    Davis CA
    (650) 430-5358
    ------------------------------



  • 3.  RE: Question: Categorizing Network Security by Resource Tower

    Posted 11-07-2023 15:45

    Thank you @Juan Jose Jarillo! These examples really help!



    ------------------------------
    Amy Foltz
    Product Owner, TBM
    Chevron
    San Ramon TX
    +1.925.842.1000
    ------------------------------



  • 4.  RE: Question: Categorizing Network Security by Resource Tower

    Posted 11-08-2023 12:45

    Ditto to Juan. I agree with his comments and approach. One key perspective is to align to budgeting and ownership. Network owns the security hardware (firewalls, intrusion detection, etc.) and is responsible for configuration and maintenance of these components. So, all these things even though related to security, contribute to the cost and budget of the network - hence network tower.

    Similarly, the security budget, as Juan mentions, is inclusive of policy and best practices as well as log analysis and aligns to the security and compliance tower.

    Under a different slice of the data... Some organizations are now wanting to understand the TCO of security and that doesn't impact the costs to towers. However, it would mean that you would want to understand, evaluate and allocate some portion of network cost, compute cost, etc to a security TCO (not the security tower)

    hope that helps

    bill



    ------------------------------
    Bill Kasenchar
    TBM SME
    REI Systems - Partner
    PA
    william.kasenchar@reisystems.com
    ------------------------------



  • 5.  RE: Question: Categorizing Network Security by Resource Tower

    Posted 11-06-2023 19:37

    Hi @Amy Foltz. ATUM is an Apptio specific model whereas Cost Pools, Resource Towers, and Solutions are taxonomies maintained by the TBM Council.

    For specific revision to ATUM, I recommend asking your Apptio CSM or posting on Apptio Community.

    On the TBM side, some research was recently completed regarding TBM and NIST which resulted in a minor revision being considered for v4. I recommend following up with @Ed Hayman, @Mina Han, and @Antonio Mitchell regarding their presentation on the topic and status of the v4 revision. I believe the v4 revision will provide the necessary clarification you're seeking.

    A recording of the Standards Committee's Open Forum regarding TBM and NIST is available below:
    https://community.tbmcouncil.org/viewdocument/q4-2023-standards-open-forum-on-t



    ------------------------------
    Matt Temple
    Transformation Excellence Manager
    Accenture US - Partner
    Long Beach CA
    (714) 349-6102
    ------------------------------



  • 6.  RE: Question: Categorizing Network Security by Resource Tower

    Posted 11-07-2023 15:45

    @Matt Temple, Thank you for the reminder about taxonomies vs. ATUM, as well as for the link to the recording!



    ------------------------------
    Amy Foltz
    Product Owner, TBM
    Chevron
    San Ramon TX
    +1.925.842.1000
    ------------------------------