CH 11
CH 11
Course Overview
The role of security and privacy as part of an EAprogram and
architecture. Security is one of the vertical “threads” that has an
impact at all levels of the EA framework. The enterprise’s Security
and Privacy Program is described in four basic parts: information
security, personnel security, operational security, and physical
security.
Course Objective
• Understand the role of security and privacy in the EA program
• Understand the role of security and privacy in managing risk
• Understand balance between information sharing and protection
• Understand the eight basic elements of a security framework
• Understand the parts of an example Security and Privacy Plan
Course Contents
• Introduction
• Risk Management and Security/Privacy
• Driver and Threats
• Creating an Integrated Set of Controls
• The Security and Privacy Program/Plan
• Key Elements of the Security and Privacy Program
• Summary
Introduction … (1)
• The role of security and privacy within an EA program is best
described as a comprehensive set of controls that pervade all
architectural domains and are a key part of an organization’s risk
management strategy
• One can think of this as a vertical thread that weaves through all
levels of the architecture
• The thread metaphor is used because security and privacy are
most effective when they are integral to the enterprise’s strategic
initiatives, business services, information flows, applications, and
technology infrastructure.
Risk Management &
Security/Privacy … (1)
• Effective security and privacy controls should operate
throughout the architecture and reflect a comprehensive
and integrated risk management solution for the
enterprise.
• This is implemented through a Security and Privacy
Program comprised of eight areas that are implemented
and maintained in the context of an enterprise-wide EA
and risk management strategy, those are : Governance,
Operations, Personnel, Workflow, Information,
Applications, Infrastructure, and Physical
Risk Management &
Security/Privacy … (2)
Drivers and Threats
• Drivers for managing risk come primarily from an enterprise’s
need to integrate processes/systems and share information.
• Purpose of the Risk Management Strategy : Finding the right
balance point in each area of an enterprise
• Threats to the security: fires, floods, earthquakes, accidents,
terrorism, hackers, disgruntled employees, runaway technologies,
and unintentional mistakes
• The best way to address security and privacy is to a set of
controls/solutions within and around key business and
technology resources and services.
• These controls provide an integrated set of risk-adjusted security
solutions in response to physical, personnel, and operational
threats to the proper functioning of EA components
Creating an Integrated Set of
Controls
• Created by including these considerations security in the planning,
design, implementation, and operation of all EA components and
artifacts.
• Security and privacy controls should also be a consideration in
business process reengineering and improvement activities, and
should be a requirement for the design of information flows
• Security and privacy should also be key checklist items when
making acquisition decisions for systems, hardware, software, and
support services at the Systems/Services level and the Technology
Infrastructure level of an architecture.
• Security and privacy controls should function to reduce or
eliminate external and internal threats.
The Security and Privacy
Program/Plan ….(1)
• Intended to provide expertise, processes, and solutions for the
protection of IT resources active in the business and technology
operating environment.
• Supports the EA by providing requirements for standards and
procedures that are used in the planning and implementation of EA
components and artifacts.
• Looks at all possible sources of threat, including threats to the
source and validity of information, control of access to the
information, and threats to the physical environment where IT
resources are located.
• Also provides Standard Operating Procedures (SOPs) that help to
organize and improve the development and certification of new
systems, the operation of legacy systems, and the response to
security incidents.
The Security and Privacy
Program/Plan ….(2)
• Should be managed by a specialist in this field, and increasingly
enterprises are establishing positions for an Information Systems
Security Manager (ISSM).
• The ISSM should have business and IT operating experience in addition
to training in the various elements of IT security.
• The ISSM should report to the CIO and work collaboratively with the
Chief Architect to ensure that EA component and artifact design,
implementation, and operational activities have effective security as a
requirement
• The ISSM should also be responsible for the development,
implementation, and maintenance of the enterprise’s Security and
Privacy Plan, in alignment with the Risk Management Plan and the EA
• The Security and Privacy Plan should provide the security related
policies and procedures for the documentation, testing, certification,
accreditation, operation, and disposal of EA components and artifacts at
all levels of the EA framework
Example Security and Privacy Plan
Format
Key Elements of Security and
Privacy Program
•Information Security
•Personnel
•Operations
•Physical protection
Program #1 : Information Security
• In the area of information security, the Security and
Privacy Program should promote :
• Security and privacy-conscious designs
• Information Content assurance
• Source authentication
• Data access control.
Information security : Design