Enterprise Information Security Architecture
Enterprise Information Security Architecture
Enterprise Information Security Architecture
The security of commercial data has always been a primary concern in business. Both for
ensuring the safety and integrity of customer data and protecting the competitive advantage
that comes with superior business intelligence, information security is vital.
While security has always been a concern, it has become even more so since the introduction
of the Internet. Whereas in the past enterprises needed
only to protect the flow of information within the business,
today they must consider the threat from outside – from
attacks on the security of the corporate Intranet, for
instance, or electronic data interchange (EDI) between the
enterprise, clients and suppliers.
Aspects of EISA
Business Architecture
To enable this alignment it is vital to accurately outline the business architecture in place to
achieve the objectives of the organization by asking several questions:
By answering these questions it becomes possible for the security architecture framers to
develop a comprehensive map of the strategies of the enterprise, along with a range of
organizational charts and business process maps.
Information Architecture
Using these plans, security architecture framers can understand the optimal flow of
information within the enterprise. What applications are used to achieve the objectives of the
business? What data do these applications require in order to achieve those objectives, and
what integration methods are in place to enable the sharing of that information?
Only by understanding these technologies and processes can it be possible for the framers to
develop a strategy for ensuring the security of this data while allowing vital business
processes to progress unimpeded.
Technology Architecture
Primarily, it is vital to understand the hardware that supports business processes – the
location and purpose of servers, for instance, and the way in which computers access the
information held on those servers.
Perhaps most importantly in the modern day is the need to build an Internet connectivity
diagram for the enterprise. Only by understanding the various connections between the
information architecture and the outside world is it possible to protect those connections.
In a Nutshell