Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA (R)

被引:8
作者
Burkett, Jason S. [1 ]
机构
[1] Veris Grp, Vienna, VA USA
来源
INFORMATION SECURITY JOURNAL | 2012年 / 21卷 / 01期
关键词
enterprise security; security architecture; enterprise architecture; cyber security; information security; enterprise security management practices;
D O I
10.1080/19393555.2011.629341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security is an imperative factor in organizational success, driven by the need to protect information assets. The continuous evolution of external and internal threats and the associated need to protect and secure information from exploitation of vulnerabilities has become a struggle for many organizations in both the public and private sectors. This struggle is the direct result of the narrow focus on operational security. Just as the lines between business and information technology have disappeared, so have the lines between business and information security. Some organizations simply "check the box" by performing the minimum actions required to pass or meet mandated compliance standards. Without practicing due diligence and by only meeting the minimum requirements, leads to the reactive response of exploited vulnerabilities in addition to the increase of after the fact incident investigations. Organizations need to take a proactive approach using established methodologies known to incorporate security into information technologies and systems. The Sherwood Applied Business Security Architecture (SABSA) is a solution oriented methodology for any business enterprise that seeks to enable its information infrastructure by applying security solutions within every layer of the organization. This article describes how SABSA can be integrated into organizations' existing architectures utilizing organizational business drivers.
引用
收藏
页码:47 / 54
页数:8
相关论文
共 9 条
  • [1] Gartner, 2006, INC SEC ENT ARCH PRO
  • [2] Harris S., 2011, 17799 ISO
  • [3] Owens J, 2011, PMBOK HIST OVERVIEW
  • [4] Sessions R., 2007, COMP TOP 4 ENTERPRIS
  • [5] Sherwood J., 2005, ENTERPRISE SECURITY, Vfirst
  • [6] Stamos A., 2011, MACS AGE APT
  • [7] The Federal Chief Information Officers Council, 2010, FED ENT ARCH SEC PRI
  • [8] The Open Group, 2008, TOGAF VERSION 9 MANU
  • [9] Zachman J. A., 2008, ZACHMAN FRAMEWORK EN