Skip to main content

2021 | OriginalPaper | Buchkapitel

Security Architecture Framework for Enterprises

verfasst von : Michelle Graham, Katrina Falkner, Claudia Szabo, Yuval Yarom

Erschienen in: Enterprise Information Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security is a complex issue for organisations, with its management now a fiduciary responsibility as well as a moral one. Without a holistic robust security structure that considers human, organisational and technical aspects to manage security, the assets of an organisation are at critical risk. Enterprise architecture (EA) is a strong and reliable structure that has been tested and used effectively for at least 30 years in organisations globally. It relies on a holistic classification structure for organisational assets. Grouping security with EA promises to leverage the benefits of EA in the security domain. We conduct a review of existing security frameworks to evaluate the extent to which they employ EA. We find that while the idea of grouping security with EA is not new, there is a need for developing a comprehensive solution. We design, develop, and demonstrate a security EA framework for organisations regardless of their industry, budgetary constraints or size; and survey professionals to analyse the framework and provide feedback. The survey results support the need for a holistic security structure and indicate benefits including reduction of security gaps, improved security investment decisions, clear functional responsibilities and a complete security nomenclature and international security standard compliance among others.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat ASD. Cyber Crime in Australia July to September 2019 (2020) ASD. Cyber Crime in Australia July to September 2019 (2020)
2.
Zurück zum Zitat Patterson, T.: Holistic security: why doing more can cost you less and lower your risk. Comput. Fraud Secur. 6, 13–15 (2003) Patterson, T.: Holistic security: why doing more can cost you less and lower your risk. Comput. Fraud Secur. 6, 13–15 (2003)
3.
Zurück zum Zitat Roeleven, S., Broer, J.: Why Two Thirds of Enterprise Architecture Projects Fail. ARIS Expert Paper (2010) Roeleven, S., Broer, J.: Why Two Thirds of Enterprise Architecture Projects Fail. ARIS Expert Paper (2010)
4.
Zurück zum Zitat Angelo, S.: Security Architecture Model Component Overview. Sans Security Essentials (2001) Angelo, S.: Security Architecture Model Component Overview. Sans Security Essentials (2001)
6.
Zurück zum Zitat Gorazo. Enterprise Architecture Literature Review (2014) Gorazo. Enterprise Architecture Literature Review (2014)
7.
Zurück zum Zitat Anderson, R.: Security Engineering. John Wiley & Sons, New Jersey (2008) Anderson, R.: Security Engineering. John Wiley & Sons, New Jersey (2008)
8.
Zurück zum Zitat Moulton, R., Coles, R.S.: Applying information security governance. Comput. Secur. 22(7), 580–584 (2003)CrossRef Moulton, R., Coles, R.S.: Applying information security governance. Comput. Secur. 22(7), 580–584 (2003)CrossRef
9.
Zurück zum Zitat Gregor, S., Hevner, A.R.: Positioning and presenting design science research for maximum impact. MIS Q. 37(2), 337–355 (2013)CrossRef Gregor, S., Hevner, A.R.: Positioning and presenting design science research for maximum impact. MIS Q. 37(2), 337–355 (2013)CrossRef
10.
Zurück zum Zitat Hevner, A.R., et al.: Design science in information systems research. MIS Quarterly, pp. 75–105 (2004) Hevner, A.R., et al.: Design science in information systems research. MIS Quarterly, pp. 75–105 (2004)
11.
Zurück zum Zitat Nunamaker Jr., J.F., Chen, M., Purdin, T.D.: Systems development in information systems research. J. Manag. Inform. Syst. 7(3), 89–106 (1990) Nunamaker Jr., J.F., Chen, M., Purdin, T.D.: Systems development in information systems research. J. Manag. Inform. Syst. 7(3), 89–106 (1990)
12.
Zurück zum Zitat Venable, J., Pries-Heje, J., Baskerville, R.: FEDS: a framework for evaluation in design science research. Eur. J. Inform. Syst. 25(1), 77–89 (2016)CrossRef Venable, J., Pries-Heje, J., Baskerville, R.: FEDS: a framework for evaluation in design science research. Eur. J. Inform. Syst. 25(1), 77–89 (2016)CrossRef
13.
Zurück zum Zitat Sein, M.K., et al.: Action design research. MIS Quarterly, pp. 37–56 (2011) Sein, M.K., et al.: Action design research. MIS Quarterly, pp. 37–56 (2011)
14.
Zurück zum Zitat Peffers, K., et al.: The design science research process: a model for producing and presenting information systems research. In: Proceedings of the First International Conference on Design Science Research in Information Systems and Technology (DESRIST 2006). ME Sharpe, Inc. (2006) Peffers, K., et al.: The design science research process: a model for producing and presenting information systems research. In: Proceedings of the First International Conference on Design Science Research in Information Systems and Technology (DESRIST 2006). ME Sharpe, Inc. (2006)
15.
Zurück zum Zitat Oppenheim, A.N.: Questionnaire Design, Interviewing and Attitude Measurement. Bloomsbury Publishing, London (2000) Oppenheim, A.N.: Questionnaire Design, Interviewing and Attitude Measurement. Bloomsbury Publishing, London (2000)
16.
Zurück zum Zitat Zachman, J.A.: A framework for information systems architecture. IBM Syst. J. 26(3), 276–292 (1987)CrossRef Zachman, J.A.: A framework for information systems architecture. IBM Syst. J. 26(3), 276–292 (1987)CrossRef
17.
18.
Zurück zum Zitat Eloff, J., Eloff, M.: Information security architecture. Comput. Fraud Secur. 11, 10–16 (2005)CrossRef Eloff, J., Eloff, M.: Information security architecture. Comput. Fraud Secur. 11, 10–16 (2005)CrossRef
19.
Zurück zum Zitat ITGI. I.G.I., Board briefing on IT governance. Information Systems Audit and Control Foundation (2001) ITGI. I.G.I., Board briefing on IT governance. Information Systems Audit and Control Foundation (2001)
20.
Zurück zum Zitat Anderson, R.: Why information security is hard-an economic perspective. In: Proceedings 17th Annual Computer Security Applications Conference, pp. 358–365. IEEE (2001) Anderson, R.: Why information security is hard-an economic perspective. In: Proceedings 17th Annual Computer Security Applications Conference, pp. 358–365. IEEE (2001)
21.
Zurück zum Zitat ISACA: An Introduction to the Business Model for Information Security (2009) ISACA: An Introduction to the Business Model for Information Security (2009)
22.
Zurück zum Zitat Vaishnavi, V., Kuechler, W.: Design research in information systems (2004) Vaishnavi, V., Kuechler, W.: Design research in information systems (2004)
23.
Zurück zum Zitat McClintock, M., et al.: Enterprise security architecture: mythology or methodology? In: International Conference on Enterprise Information Systems (2020) McClintock, M., et al.: Enterprise security architecture: mythology or methodology? In: International Conference on Enterprise Information Systems (2020)
24.
Zurück zum Zitat Crotty, M.: The Foundations of Social Research: Meaning and Perspective in the Research Process. Sage, London (1998) Crotty, M.: The Foundations of Social Research: Meaning and Perspective in the Research Process. Sage, London (1998)
25.
Zurück zum Zitat Hirschheim, R.: Information systems epistemology: an historical perspective. Res. Methods Inform. Syst. 9, 13–35 (1985) Hirschheim, R.: Information systems epistemology: an historical perspective. Res. Methods Inform. Syst. 9, 13–35 (1985)
26.
Zurück zum Zitat Fosnot, C.T.: Constructivism: Theory, Perspectives, and Practice. Teachers College Press, New York (2013) Fosnot, C.T.: Constructivism: Theory, Perspectives, and Practice. Teachers College Press, New York (2013)
27.
Zurück zum Zitat Strauss, A., Corbin, J.: Basics of Qualitative Research Techniques. Sage Publications, New York (1998) Strauss, A., Corbin, J.: Basics of Qualitative Research Techniques. Sage Publications, New York (1998)
28.
Zurück zum Zitat Mills, J., Bonner, A., Francis, K.: The development of constructivist grounded theory. Int. J. Qual. Methods 5(1), 25–35 (2006)CrossRef Mills, J., Bonner, A., Francis, K.: The development of constructivist grounded theory. Int. J. Qual. Methods 5(1), 25–35 (2006)CrossRef
29.
Zurück zum Zitat Lee, A.S., Baskerville, R.L.: Generalizing generalizability in information systems research. Inform. Syst. Res. 14(3), 221–243 (2003)CrossRef Lee, A.S., Baskerville, R.L.: Generalizing generalizability in information systems research. Inform. Syst. Res. 14(3), 221–243 (2003)CrossRef
30.
Zurück zum Zitat Williams, M.: Questionnaire design. Making Sense of Social Research, pp. 104–124 (2003) Williams, M.: Questionnaire design. Making Sense of Social Research, pp. 104–124 (2003)
31.
Zurück zum Zitat Rattray, J., Jones, M.C.: Essential elements of questionnaire design and development. J. Clin. Nurs. 16(2), 234–243 (2007)CrossRef Rattray, J., Jones, M.C.: Essential elements of questionnaire design and development. J. Clin. Nurs. 16(2), 234–243 (2007)CrossRef
32.
Zurück zum Zitat Urquhart, C., Lehmann, H., Myers, M.D.: Putting the ‘theory’ back into grounded theory: guidelines for grounded theory studies in information systems. Inform. Syst. J. 20(4), 357–381 (2010)CrossRef Urquhart, C., Lehmann, H., Myers, M.D.: Putting the ‘theory’ back into grounded theory: guidelines for grounded theory studies in information systems. Inform. Syst. J. 20(4), 357–381 (2010)CrossRef
33.
Zurück zum Zitat Starks, H., Brown Trinidad, S.: Choose your method: a comparison of phenomenology, discourse analysis, and grounded theory. Qual. Health Res. 17(10), 1372–1380 (2007) Starks, H., Brown Trinidad, S.: Choose your method: a comparison of phenomenology, discourse analysis, and grounded theory. Qual. Health Res. 17(10), 1372–1380 (2007)
34.
Zurück zum Zitat Strauss, A., Corbin, J.: Grounded theory methodology. Handb. Qual. Res. 17, 273–85 (1994) Strauss, A., Corbin, J.: Grounded theory methodology. Handb. Qual. Res. 17, 273–85 (1994)
35.
Zurück zum Zitat Martin, P.Y., Turner, B.A.: Grounded theory and organizational research. J. Appl. Behav. Sci. 22(2), 141–157 (1986)CrossRef Martin, P.Y., Turner, B.A.: Grounded theory and organizational research. J. Appl. Behav. Sci. 22(2), 141–157 (1986)CrossRef
36.
Zurück zum Zitat Siponen, M., Willison, R.: Information security management standards: problems and solutions. Inform. Manag. 46(5), 267–270 (2009)CrossRef Siponen, M., Willison, R.: Information security management standards: problems and solutions. Inform. Manag. 46(5), 267–270 (2009)CrossRef
37.
Zurück zum Zitat Bittler, R.S., Kreizman, G.: Gartner Enterprise Architecture Process: Evolution 2005. G00130849, Gartner, Stamford, CT, pp. 1–12 (2005) Bittler, R.S., Kreizman, G.: Gartner Enterprise Architecture Process: Evolution 2005. G00130849, Gartner, Stamford, CT, pp. 1–12 (2005)
38.
Zurück zum Zitat Josey, A.: TOGAF Version 9.1 Enterprise Edition: An Introduction. The Open Group (2009) Josey, A.: TOGAF Version 9.1 Enterprise Edition: An Introduction. The Open Group (2009)
39.
Zurück zum Zitat USG. U.S.F.G., Introduction to the Federal Enterprise Architecture Framework V2 (2013) USG. U.S.F.G., Introduction to the Federal Enterprise Architecture Framework V2 (2013)
40.
Zurück zum Zitat DoD, C.: DoDAF Architecture Framework Version 2.02. Website, August 2010 DoD, C.: DoDAF Architecture Framework Version 2.02. Website, August 2010
41.
Zurück zum Zitat ISO. I.S.O./I.E.C. 27000, 27001 and 27002 for information security management (2013) ISO. I.S.O./I.E.C. 27000, 27001 and 27002 for information security management (2013)
42.
Zurück zum Zitat Zachman, J.A.: The framework for enterprise architecture: background, description and utility. Zachman International (1996) Zachman, J.A.: The framework for enterprise architecture: background, description and utility. Zachman International (1996)
43.
Zurück zum Zitat Sherwood, J., Clark, A., Lynas, D.: Enterprise security architecture. SABSA White Paper, vol. 2009 (1995) Sherwood, J., Clark, A., Lynas, D.: Enterprise security architecture. SABSA White Paper, vol. 2009 (1995)
44.
Zurück zum Zitat Shariati, M., Bahmani, F., Shams, F.: Enterprise information security, a review of architectures and frameworks from interoperability perspective. Procedia Comput. Sci. 3, 537–543 (2011)CrossRef Shariati, M., Bahmani, F., Shams, F.: Enterprise information security, a review of architectures and frameworks from interoperability perspective. Procedia Comput. Sci. 3, 537–543 (2011)CrossRef
45.
Zurück zum Zitat Oda, S.M., Fu, H., Zhu, Y.: Enterprise information security architecture a review of frameworks, methodology, and case studies. In: ICCSIT 2009. IEEE (2009) Oda, S.M., Fu, H., Zhu, Y.: Enterprise information security architecture a review of frameworks, methodology, and case studies. In: ICCSIT 2009. IEEE (2009)
46.
Zurück zum Zitat Zachman, J.P.: The Zachman Framework Evolution (2011) Zachman, J.P.: The Zachman Framework Evolution (2011)
47.
Zurück zum Zitat Veiga, A.D., Eloff, J.H.: An information security governance framework. Inform. Syst. Manag. 24(4), 361–372 (2007)CrossRef Veiga, A.D., Eloff, J.H.: An information security governance framework. Inform. Syst. Manag. 24(4), 361–372 (2007)CrossRef
48.
Zurück zum Zitat Claycomb, W., Shin, D.: Mobile-driven architecture for managing enterprise security policies. In: ACMSE 2006. ACM (2006) Claycomb, W., Shin, D.: Mobile-driven architecture for managing enterprise security policies. In: ACMSE 2006. ACM (2006)
Metadaten
Titel
Security Architecture Framework for Enterprises
verfasst von
Michelle Graham
Katrina Falkner
Claudia Szabo
Yuval Yarom
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-75418-1_40