22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2. To ensure that the potential vulnerabilities and exception conditions (i.e.,<br />

perils) within IT business process flows are addressed in ways that are<br />

consistent with the risk management objectives.<br />

These objectives show the duality of security design: to support and assure<br />

normal flows, as well as identify and account for all illicit flows and anomalous<br />

events.<br />

2.4.6 Business process model<br />

Figure 2-11 on page 74 represents IT process flows for a generalized business<br />

system. The process flows reflect the events and conditions in which information<br />

assets are acted upon by processes that are invoked by users, or by processes<br />

acting on behalf of users. The left arrow represents the model business flow<br />

within a trusted environment, and the right arrow represents a more realistic view<br />

of the business flow, where perils exist in the operating environment.<br />

Chapter 2. Security methodologies 73

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!