Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA (R)

被引:8
|
作者
Burkett, Jason S. [1 ]
机构
[1] Veris Grp, Vienna, VA USA
来源
INFORMATION SECURITY JOURNAL | 2012年 / 21卷 / 01期
关键词
enterprise security; security architecture; enterprise architecture; cyber security; information security; enterprise security management practices;
D O I
10.1080/19393555.2011.629341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security is an imperative factor in organizational success, driven by the need to protect information assets. The continuous evolution of external and internal threats and the associated need to protect and secure information from exploitation of vulnerabilities has become a struggle for many organizations in both the public and private sectors. This struggle is the direct result of the narrow focus on operational security. Just as the lines between business and information technology have disappeared, so have the lines between business and information security. Some organizations simply "check the box" by performing the minimum actions required to pass or meet mandated compliance standards. Without practicing due diligence and by only meeting the minimum requirements, leads to the reactive response of exploited vulnerabilities in addition to the increase of after the fact incident investigations. Organizations need to take a proactive approach using established methodologies known to incorporate security into information technologies and systems. The Sherwood Applied Business Security Architecture (SABSA) is a solution oriented methodology for any business enterprise that seeks to enable its information infrastructure by applying security solutions within every layer of the organization. This article describes how SABSA can be integrated into organizations' existing architectures utilizing organizational business drivers.
引用
收藏
页码:47 / 54
页数:8
相关论文
共 50 条
  • [21] Integrating Security into Enterprise Architecture with UAF and PLE
    Hause, Matthew
    Hause, Matthew (mhause@designxi.com), 1600, John Wiley and Sons Inc (23): : 44 - 50
  • [22] Enterprise knowledge security architecture for military experimentation
    Maule, RW
    INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, 2005, : 3409 - 3414
  • [23] Challenges for Risk and Security Modelling in Enterprise Architecture
    Grov, Gudmund
    Mancini, Federico
    Mestl, Elsie Margrethe Staff
    PRACTICE OF ENTERPRISE MODELING, POEM 2019, 2019, 369 : 215 - 225
  • [24] Enterprise Architecture Models for Cyber Security Analysis
    Ekstedt, Mathias
    Sommestad, Teodor
    2009 IEEE/PES POWER SYSTEMS CONFERENCE AND EXPOSITION, VOLS 1-3, 2009, : 832 - 837
  • [25] Enhanced Data Security Architecture in Enterprise Networks
    Shree, V. Rashmi
    Antony, Zachariah C. F.
    Jayapandian, N.
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 857 - 864
  • [26] Methodology to Ensure Information Security in a Distributed Architecture for a Public Organization of Ecuador
    Toapanta Toapanta, Segundo Moises
    Mendoza Quimi, Felix Gustavo
    Ortiz Pazmino, Kevin Eduardo
    Maciel Arrellano, Rocio
    Mafla Gallegos, Luis Enrique
    FUZZY SYSTEMS AND DATA MINING V (FSDM 2019), 2019, 320 : 933 - 944
  • [27] A Layered Trust Information Security Architecture
    Albuquerque, Robson De Oliveira
    Garcia Villalba, Luis Javier
    Sandoval Orozco, Ana Lucila
    Buiati, Fabio
    Kim, Tai-Hoon
    SENSORS, 2014, 14 (12): : 22754 - 22772
  • [28] An Information Security Architecture for Smart Cities
    Berkel, A. R. R.
    Singh, P. M.
    van Sinderen, M. J.
    BUSINESS MODELING AND SOFTWARE DESIGN, BMSD 2018, 2018, 319 : 167 - 184
  • [29] Enforcing information security: architecture and responsibilities
    ISACA
    Netw. Secur., 2008, 2 (7-10):
  • [30] Obtaining secure business process models from an enterprise architecture considering security requirements
    San Martin, Luis
    Rodriguez, Alfonso
    Caro, Angelica
    Velasquez, Ignacio
    BUSINESS PROCESS MANAGEMENT JOURNAL, 2022, 28 (01) : 150 - 177