Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA (R)

被引:8
|
作者
Burkett, Jason S. [1 ]
机构
[1] Veris Grp, Vienna, VA USA
来源
INFORMATION SECURITY JOURNAL | 2012年 / 21卷 / 01期
关键词
enterprise security; security architecture; enterprise architecture; cyber security; information security; enterprise security management practices;
D O I
10.1080/19393555.2011.629341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security is an imperative factor in organizational success, driven by the need to protect information assets. The continuous evolution of external and internal threats and the associated need to protect and secure information from exploitation of vulnerabilities has become a struggle for many organizations in both the public and private sectors. This struggle is the direct result of the narrow focus on operational security. Just as the lines between business and information technology have disappeared, so have the lines between business and information security. Some organizations simply "check the box" by performing the minimum actions required to pass or meet mandated compliance standards. Without practicing due diligence and by only meeting the minimum requirements, leads to the reactive response of exploited vulnerabilities in addition to the increase of after the fact incident investigations. Organizations need to take a proactive approach using established methodologies known to incorporate security into information technologies and systems. The Sherwood Applied Business Security Architecture (SABSA) is a solution oriented methodology for any business enterprise that seeks to enable its information infrastructure by applying security solutions within every layer of the organization. This article describes how SABSA can be integrated into organizations' existing architectures utilizing organizational business drivers.
引用
收藏
页码:47 / 54
页数:8
相关论文
共 50 条
  • [1] Enterprise security architecture in business convergence environments
    Kim, S
    Leem, CS
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2005, 105 (07) : 919 - 936
  • [2] Research on Architecture of Information Security in Enterprise Portal
    Wang, Wei
    Wang, Ying
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 420 - 424
  • [3] Improving Information Security Through Risk Management and Enterprise Architecture Integration
    Nather, Sarah
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 420 - 426
  • [4] An Enterprise Security Program and Architecture to Support Business Drivers
    Ritchot, Brian
    TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2013, : 25 - 33
  • [5] Intelligent Enterprise Information Security Architecture based on Service Oriented Architecture
    Sun, Jianguang
    Chen, Yan
    2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS, 2008, : 196 - 200
  • [6] PLANNING PRACTICE OF SECURITY ARCHITECTURE OF ENTERPRISE INFORMATION SYSTEMS
    Sun Jun-jun
    Feng mei
    Shi Guo-wei
    Zhang Bei
    Chen liang
    2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS ( ICIMCS 2011), VOL 1: INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2011, : 363 - 365
  • [7] Fujitsu enterprise security architecture
    Shiozaki, Tetsuo
    Okuhara, Masayuki
    Yoshikawa, Nobuo
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2007, 43 (02): : 153 - 158
  • [8] Fujitsu enterprise security architecture
    Shiozaki, Tetsuo
    Okuhara, Masayuki
    Yoshikawa, Nobuo
    Fujitsu Scientific and Technical Journal, 2007, 43 (02): : 153 - 158
  • [9] A roadmap to the enterprise security architecture
    Kim, Young-Gab
    Kang, Seung-Seok
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2018, 123 : 47 - 48
  • [10] Managing information security in a business network of machinery maintenance services business - Enterprise architecture as a coordination tool
    Pulkkinen, Mirja
    Naumenko, Anton
    Luostarinen, Karl
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (10) : 1607 - 1620