Jump to content

Enterprise information security architecture

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Wizardman (talk | contribs) at 20:35, 2 October 2022 (Methodology: completely unsourced). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Enterprise information security architecture (ZBI) is a part of enterprise architecture focusing on information security throughout the enterprise. The name implies a difference that may not exist between small/medium-sized businesses and larger organizations.

Overview

Enterprise information security architecture is becoming a common practice within financial institutions around the globe. The primary purpose of creating an enterprise information security architecture is to ensure that business strategy and IT security are aligned.[1]

Enterprise information security architecture topics

Positioning

Enterprise information security architecture was first formally positioned by Gartner in their whitepaper called “Incorporating Security into the Enterprise Architecture Process”.[2] This was published on 24 January 2006. Since this publication, security architecture has moved from being a silo-based architecture to an enterprise-focused solution that incorporates business, information and technology. The picture below represents a one-dimensional view of enterprise architecture as a service-oriented architecture. It also reflects the new addition to the enterprise architecture family called “Security”. Business architecture, information architecture and technology architecture used to be called BIT for short. Now with security as part of the architecture family, it has become BITS.

High-level security architecture framework

Huxham Security Framework

Enterprise information security architecture frameworks are only a subset of enterprise architecture frameworks. If we had to simplify the conceptual abstraction of enterprise information security architecture within a generic framework, the picture on the right would be acceptable as a high-level conceptual security architecture framework.

Other open enterprise architecture frameworks are:

See also

References

  1. ^ "21 principles of enterprise architecture for the financial sector". developer.ibm.com. Retrieved 2022-09-28.
  2. ^ "Incorporating Security Into the Enterprise Architecture Process". www.gartner.com. Archived from the original on June 6, 2010. Retrieved 30 August 2015.
  3. ^ Capgemini's Integrated Architecture Framework Archived June 23, 2006, at the Wayback Machine
  4. ^ "Enterprise Architecture". enterprisearchitecture.nih.gov. Archived from the original on 19 June 2013. Retrieved 30 August 2015.
  5. ^ "Open Security Architecture". www.opensecurityarchitecture.org. Retrieved 30 August 2015.

Further reading

  • Carbone, J. A. (2004). IT architecture toolkit. Enterprise computing series. Upper Saddle River, NJ, Prentice Hall PTR.
  • Cook, M. A. (1996). Building enterprise information architectures : reengineering information systems. Hewlett-Packard professional books. Upper Saddle River, NJ, Prentice Hall.
  • Fowler, M. (2003). Patterns of enterprise application architecture. The Addison-Wesley signature series. Boston, Addison-Wesley.
  • SABSA integration with TOGAF.
  • Groot, R., M. Smits and H. Kuipers (2005). "A Method to Redesign the IS Portfolios in Large Organisations", Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05). Track 8, p. 223a. IEEE.
  • Steven Spewak and S. C. Hill (1993). Enterprise architecture planning : developing a blueprint for data, applications, and technology. Boston, QED Pub. Group.
  • Woody, Aaron (2013). Enterprise Security: A Data-Centric Approach to Securing the Enterprise. Birmingham, UK. Packt Publishing Ltd.