Preview

Gartner 2006 Integrating Security Into the Enterprise Architecture Framework.Pdf

Powerful Essays
Open Document
Open Document
2565 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Gartner 2006 Integrating Security Into the Enterprise Architecture Framework.Pdf
Research
Publication Date: 25 January 2006 ID Number: G00137069

Integrating Security Into the Enterprise Architecture Framework
Gregg Kreizman, Bruce Robertson

Enterprise architecture frameworks should integrate and separate security and other EA deliverables to offer value to security professionals and other business and IT planners.

© 2006 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

WHAT YOU NEED TO KNOW
An enterprise architecture (EA) framework should allow for security-related requirements and artifacts to be organized within primary EA viewpoints, but should also have these security elements abstracted to a security-only viewpoint. This allows different stakeholders to view these requirements and artifacts in ways that best help them do their jobs while ensuring that security requirements are built in to all aspects of solutions.

ANALYSIS
An architecture framework provides a structure and a common set of semantics that enforce consistency across the wide range of participants in enterprise architecture initiatives who typically come from diverse areas of the business. Without a framework, it is difficult to relate work in different areas to each other and to integrate that work. With a framework, work in different areas by different

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Rozanski, N., & Woods, E. (2011). Software Systems Architecture: Working with Stakeholders Using Viewpoints and Perspectives. Addison-Wesley, 2011, from www.books.googlr.com…

    • 574 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Is3230 Project Description

    • 2573 Words
    • 19 Pages

    and management of an information systems security framework. To be able to do so, you need to be able…

    • 2573 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    week 3

    • 580 Words
    • 3 Pages

    Application architecture is the process of defining a structured solution that meets all of the technical and operational requirements, while optimizing common quality attributes such as performance, security, and manageability (Shaw and Garland 1996). Applications are designed using the steps from the system development life cycle and the process will be described be designing an information system for Riordan Manufacturing.…

    • 580 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    describe the necessity of secure architecture in information systems analyze the role of security models and architectures and their relationship to information security explain the…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    CMGT430 2015 SYLLABUS

    • 2598 Words
    • 16 Pages

    and facility access as well as the concepts for protecting the hardware and software assets of an enterprise.…

    • 2598 Words
    • 16 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 7 Week 7

    • 594 Words
    • 3 Pages

    This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations(New Horizon,2016)…

    • 594 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    gap analysis. You should include tasks, resources, cost estimates, and time estimates in the project plan.…

    • 313 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1.4 Examine major security issues associated with Enterprise Application Integration (EAI) and Enterprise Collaboration Systems (ECS).…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For businesses to keep pace with the latest technology, threats and to remain in compliance with current and future regulations or policies need to have effective management of information security in their organization. Information Security Management Frameworks are based on existing accepted standards, guidelines, and collections of practices that should be implemented in an IT department. I will discuss some frameworks of information security management, their pros and cons, some major perspectives to consider in information security management and the benefits of information security management frameworks.…

    • 721 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Ziemann, J. (2010). Architecture of Interoperable Information Systems: An Enterprise Model-based Approach for Describing and Enacting Collaborative Business Processes. Logos Verlag Berlin GmbH, 2010.…

    • 1988 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    While both of the above elements of the question complement each other, without understanding the main purpose of security management, which is in itself is multifaceted in nature, and ideally to be successful should be employed throughout all aspects of a business, as can be seen…

    • 1598 Words
    • 7 Pages
    Powerful Essays