SlideShare una empresa de Scribd logo
1 de 43
Information Security &
Enterprise Architecture
Is information security
built-in or add-on
in the
plan, design and execution
of information and communication
systems?
Information Security
Requirements
INFORMATION
MANAGEMENT
INFORMATION SECURITY
Confidentiality Integrity Availability
1. Create
2. Store
3. Utilize
4. Share
5. Dispose
ENTERPRISE ARCHITECTURE
INFORMATION SECURITY
ENTERPRISE
ARCHITECTURE
INFORMATION SECURITY
PRINCIPLES LEGAL TECHNICAL GOVERNANCE
PROCESS
DATA
APPLICATION
TECHNOLOGY
ENTERPRISE
• "Enterprise" is an entity defined and organized
to create value
• The value creation is structured to be
composed of product, services, people,
location, performance, function, process,
data, application, technology, infrastructure
and providers.
johnmacasio@gmail.com
ARCHITECTURE
• Speaks of drawn model to describe
the holistic and particular view of the
system in actualizing the “value”
defined for the organization.
• Blueprint which define the baseline of
common and differentiated
information on how the system is
organized and expected to behave to
actualize the mandate, mission,
principles, vision, goals, objectives
and performance.
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
Need for Enterprise Architecture
johnmacasio@gmail.com
VALUE OF ENTERPRISE ARCHITECTURE
“You are going to do
architecture, because without
architecture, you cannot do
any of these things:
• Alignment
• Integration
• Change
• Reduced Time-to-Market
-John Zachman
Enterprise Architecture Framework
johnmacasio@gmail.com
VALUE OF ENTERPRISE ARCHITECTURE
ALIGNMENT
• Enterprise architecture provides the
framework to enable better alignment of
business and information technology
objectives. The architecture used can also
serve as a communication tool.
VALUE OF ENTERPRISE ARCHITECTURE
INTEGRATION
• Enterprise architecture establishes the
infrastructure that enables business rules to
be consistently applied across the
organization, documents data flows, uses and
interfaces.
VALUE OF ENTERPRISE ARCHITECTURE
VALUE CREATION
• Enterprise architecture provides better
measurement of information technology
economic value in an environment
where there is a higher potential for
reusable hardware and software assets
VALUE OF ENTERPRISE ARCHITECTURE
CHANGE MANAGEMENT
• Enterprise architecture establishes consistent
infrastructure and formalizing the
management of the infrastructure and
information assets better enables an
organization-wide change management
process to be established to handle
information technology changes
VALUE OF ENTERPRISE ARCHITECTURE
COMPLIANCE
• Enterprise architecture provides the artifacts
necessary to ensure legal and regulatory
compliance for the technical infrastructure
and environment.
- Schekkerman, J. (2005). Trends in Enterprise Architecture,
Institute for Enterprise ArchitectureDevelopment
ENTERPRISE ARCHITECTURE DOMAIN
TECHNOLOGY
INFRASTRUCTURE
INFORMATION
DATA & APPLICATION
BUSINESS
FUNCTIONS
PROCESS &
POLICIES
ORGANIZATION &
STAKEHOLDERS
MANDATE
VISION
GOALS
PROGRAMS
1. Intention
2. Business
3. Information
4. Technology
johnmacasio@gmail.com
ARCHITECTURE DOMAINS
1. BUSINESS ARCHITECTURE
Definition of the business strategy, governance,
organization, and key business processes of the
enterprise
2. APPLICATION ARCHITECTURE
Provision of functional blueprint for the
individual application system to be deployed,
the interaction between application system, and
their relationship to the core business processes
of the enterprise
johnmacasio@gmail.com
ARCHITECTURE DOMAINS
3. DATA ARCHITECTURE
Structural definition of the logical and physical data
assets of the enterprise, and the associate data
management resources.
4. TECHNOLOGY ARCHITECTURE
Definition of the hardware, software and network
infrastructure to support the deployment of core
and mission-critical applications. It includes
description of technology standards and
methodology.
johnmacasio@gmail.com
ENTERPRISE ARCHITECTURE
COMPONENTS IN ICT SERVICES
USE CASE
APPLICATION
SYSTEM
DATA
SERVICES
APPLICATION
SERVICES
CONNECTIVITY
SERVICES
USERS
ACCESS
BUSINESS
PROCESSES
MEMBERSHIP
COLLECTION
BENEFITS
ACCREDITATION
DATA
ELEMENTS
DATABASE
SYSTEM
NETWORK
INFRASTRUCTURE
POINT OF PRESENCE
CUSTOMER
CLIENTS
PROVIDERS
SUPPLIERS
johnmacasio@gmail.com
E
Membership Collection Benefits Accreditation
CUSTOMER RELATIONSHIP MANAGEMENT
ENTERPRISE RESOURCE PLANNING
Planning Audit Risks Legal/Policy
ENTERPRISE PERFORMANCE MANAGEMENT
Finance
Human
Resource
Assets
Facilities
Technology
DATA
APPLICATION
BUSINESS
PROCESS
TECHNOLOGY
INFRASTRUCTURE
CASE: BUSINESS INFORMATION SYSTEM INTEGRATION VIEW
INFORMATION
SECURITY
E
N
T
E
R
P
R
I
S
E
A
R
C
H
I
T
E
C
T
U
R
E
johnmacasio@gmail.com
SUCCESS COMPONENTS OF
INFORMATION SYSTEM
Agency
Citizen
DeLone and McLean Model
johnmacasio@gmail.com
Enterprise Architecture
Information Security
Questions
Information
Security
Principles
Information
Security
Risks
Information
Security
Methodology
BUSINESS
FUNCTION
PROCESS
BUSINESS
DATA &
APPLICATION
BUSINESS
TECHNOLOGY
INFRASTRUCTURE
ENTERPRISE
INFORMATION
SECURITY
johnmacasio@gmail.com
Information
Security
Governance
NETWORKED INFORMATION
SUPPLIER & CUSTOMER
Information Security Means…
Information
Security
Confidentiality
Availability
Integrity
Secrecy, Privacy and Authority
Accurate, Complete and Reliable
Accessible, Immediate and Uptime
johnmacasio@gmail.com
johnmacasio@gmail.com
Information Insecurity Means…
StolenMisrepresented
Breached
Information is
not secure
when
something is
Misused
IncompleteUnauthorized
Compromised Denied
CASE: HEALTH INSURANCE
INFORMATION SECURITY
MEMBERSHIP
MANAGEMENT
COLLECTION
MANAGEMENT
BENEFITS
MANAGEMENT
ACCREDITATION
MANAGEMENT
payment
identification
claims
certification
johnmacasio@gmail.com
CASE: HEALTH INSURANCE
INFORMATION SECURITY
FINANCIAL
MANAGEMENT
PERSONNEL
MANAGEMENT
ASSET
MANAGEMENT
LEGAL
MANAGEMENT
johnmacasio@gmail.com
CASE: HEALTH INSURANCE
INFORMATION SECURITY
AUDIT
MANAGEMENT
STRATEGY
MANAGEMENT
RISK
MANAGEMENT
PROJECT
MANAGEMENT
johnmacasio@gmail.com
CASE: HEALTH INSURANCE
INFORMATION SECURITY
INFRASTRUCTURE
MANAGEMENT
NETWORK
MANAGEMENT
APPLICATION
MANAGEMENT
DATA
MANAGEMENT
johnmacasio@gmail.com
Mitigating Information
Security Risk
Information
Security
Risk
Mitigation
Assessment
Policy Governance
Technology
johnmacasio@gmail.com
Why Who
What How
Security Policy Requirement
Governance
•Functional
Organization
•Roles and
Responsibilities
Competencies
•Knowledge, Skills and
Attitudes Requirements
•Training Program and
Certification
Process
•Business Workflow,
Procedures and Rules
•Risk Audit and Control
Procedures
Data
Infrastructure
•Acceptable Use
•Data Management
•Risk Audit and
Control Procedures
•Infrastructure
Management
•Sourcing &
Procurement
•Risk Audit and
Control
Governance
Guidance and
Implementation
Competency
Reference and
Assessment
Functions
Process
Models and
Control
Guidance
Data and Application
Security Models and
Acceptable Use
Physical Configuration
Network Models
Service Sourcing
Trusted Technology
Acceptable Use
No Need to
Reinvent the Wheel
1. Recognize security needs & question
2. Find the fitted practitioner standards
3. Apply standards to real life condition
4. Assess and improve the practice
johnmacasio@gmail.com
Governance
Competency
Process
Data
Infrastructure
Information Security
Risk Assessment
Information
Asset
Inventory
(Information
Systems)
Risk
Mitigation
Treatment
Prevention
Impact
Rating of
Vulnerability
Identification
Vulnerability
Threat Source
johnmacasio@gmail.com
1. Organization
2. Process
3. Data
4. Application
5. Infrastructure
What it means
to secure information…
1. Establish the governance and
management organization of
information security that
comply to best practice
standards.
johnmacasio@gmail.com
What it means
to secure information…
2. Identify the information
assets, and perform the
assessment of vulnerabilities
and threats that surround
the creation, storage, use
and sharing of information.
johnmacasio@gmail.com
What it means
to secure information…
3. Develop, document and
implement policies, standards,
procedures, and guidelines that
ensure confidentiality, integrity,
and availability in the person,
process, data, application and
infrastructure of information.
johnmacasio@gmail.com
What it means
to secure information…
4. Evaluate, acquire and use
security management tools to
classify data and risk, to audit
information system, to assess
and analyze risks in the solution
development and infrastructure,
to monitor and control areas of
vulnerabilities. and implement
security controls and appropriate
reactive responses to threats.
johnmacasio@gmail.com
Basic Security Steps
Authorized
Access
Device
Integrity
Data
Exchange
Protocol
Monitoring
& Audit
Network
Hardening
Service
Agreements
Information
Systems
Security
Standards
Risk
Assessment
& Policies
Security
Services
User
Training
johnmacasio@gmail.com
CHANGE…
1. We can only evaluate that which
is measurable
2. We can only test that which is
agreed.
3. We can only improve that which
is actualized.
4. We can only change that which
is established.
johnmacasio@gmail.com

Más contenido relacionado

La actualidad más candente

IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
CYBER SENSE
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
SlideTeam
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
SlideTeam
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 

La actualidad más candente (20)

NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR RACI.pdf
 
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksUnderstanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacks
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 

Destacado

ICT4GOV PROJECT MANAGEMENT
ICT4GOV PROJECT MANAGEMENTICT4GOV PROJECT MANAGEMENT
ICT4GOV PROJECT MANAGEMENT
John Macasio
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
Tammy Clark
 
(API) Docs for Developers
(API) Docs for Developers(API) Docs for Developers
(API) Docs for Developers
Brandon West
 
Learnings @WalmartLabs - Agile journey
Learnings @WalmartLabs  - Agile journeyLearnings @WalmartLabs  - Agile journey
Learnings @WalmartLabs - Agile journey
Abinav Munshi
 
UMT eCommerce Practice Deck - TechM.
UMT eCommerce Practice Deck - TechM.UMT eCommerce Practice Deck - TechM.
UMT eCommerce Practice Deck - TechM.
Debdattaa Saha
 

Destacado (20)

Making IA Real: Planning an Information Architecture Strategy
Making IA Real: Planning an Information Architecture StrategyMaking IA Real: Planning an Information Architecture Strategy
Making IA Real: Planning an Information Architecture Strategy
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Enterprise Information Architecture in Context (later renamed Enterprise Cont...
Enterprise Information Architecture in Context (later renamed Enterprise Cont...Enterprise Information Architecture in Context (later renamed Enterprise Cont...
Enterprise Information Architecture in Context (later renamed Enterprise Cont...
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
ICT4GOV PROJECT MANAGEMENT
ICT4GOV PROJECT MANAGEMENTICT4GOV PROJECT MANAGEMENT
ICT4GOV PROJECT MANAGEMENT
 
Solving data discovery in the enterprise
Solving data discovery in the enterpriseSolving data discovery in the enterprise
Solving data discovery in the enterprise
 
Creating a Security Plan for Your Agency - Laird Rixford
Creating a Security Plan for Your Agency - Laird RixfordCreating a Security Plan for Your Agency - Laird Rixford
Creating a Security Plan for Your Agency - Laird Rixford
 
Doing Enterprise Architecture
Doing Enterprise ArchitectureDoing Enterprise Architecture
Doing Enterprise Architecture
 
InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Security Assessment Plan (Template)
Security Assessment Plan (Template)Security Assessment Plan (Template)
Security Assessment Plan (Template)
 
TDD in Zend Framework 2
TDD in Zend Framework 2TDD in Zend Framework 2
TDD in Zend Framework 2
 
(API) Docs for Developers
(API) Docs for Developers(API) Docs for Developers
(API) Docs for Developers
 
Learnings @WalmartLabs - Agile journey
Learnings @WalmartLabs  - Agile journeyLearnings @WalmartLabs  - Agile journey
Learnings @WalmartLabs - Agile journey
 
Leveraging technology in supply chain logistica12
Leveraging technology in supply chain logistica12Leveraging technology in supply chain logistica12
Leveraging technology in supply chain logistica12
 
Modeling Information Experiences: A Recipe for Consistent Architecture
Modeling Information Experiences: A Recipe for Consistent ArchitectureModeling Information Experiences: A Recipe for Consistent Architecture
Modeling Information Experiences: A Recipe for Consistent Architecture
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: Salmon
 
Navision with ecommerce Services
Navision with ecommerce ServicesNavision with ecommerce Services
Navision with ecommerce Services
 
Competency Modeling for Business Process Review
Competency Modeling for Business Process ReviewCompetency Modeling for Business Process Review
Competency Modeling for Business Process Review
 
UMT eCommerce Practice Deck - TechM.
UMT eCommerce Practice Deck - TechM.UMT eCommerce Practice Deck - TechM.
UMT eCommerce Practice Deck - TechM.
 

Similar a Enterprise Architecture and Information Security

Optimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise ArchitectureOptimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise Architecture
Nathaniel Palmer
 
Workable Enteprise Data Governance
Workable Enteprise Data GovernanceWorkable Enteprise Data Governance
Workable Enteprise Data Governance
Bhavendra Chavan
 
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...
Egyptian Engineers Association
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
subramanian K
 

Similar a Enterprise Architecture and Information Security (20)

april2023.pptx
april2023.pptxapril2023.pptx
april2023.pptx
 
Optimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise ArchitectureOptimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise Architecture
 
Workable Enteprise Data Governance
Workable Enteprise Data GovernanceWorkable Enteprise Data Governance
Workable Enteprise Data Governance
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
MS IT-strategy.pptx
MS IT-strategy.pptxMS IT-strategy.pptx
MS IT-strategy.pptx
 
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...
 
Business Architecture.pptx
Business Architecture.pptxBusiness Architecture.pptx
Business Architecture.pptx
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
 
SIA LESSON.pptx
SIA LESSON.pptxSIA LESSON.pptx
SIA LESSON.pptx
 
The Digital Group’s Enterprise Transformation Consulting Services
The Digital Group’s Enterprise Transformation Consulting ServicesThe Digital Group’s Enterprise Transformation Consulting Services
The Digital Group’s Enterprise Transformation Consulting Services
 
enterprise-architecture part2.pptx
enterprise-architecture part2.pptxenterprise-architecture part2.pptx
enterprise-architecture part2.pptx
 
enterprise-architecture.pptx
enterprise-architecture.pptxenterprise-architecture.pptx
enterprise-architecture.pptx
 
Data-Ed Webinar: Data Quality Engineering
Data-Ed Webinar: Data Quality EngineeringData-Ed Webinar: Data Quality Engineering
Data-Ed Webinar: Data Quality Engineering
 
2014 dqe handouts
2014 dqe handouts2014 dqe handouts
2014 dqe handouts
 
ERP for IT
ERP for ITERP for IT
ERP for IT
 
Info tech membership overview
Info tech membership overviewInfo tech membership overview
Info tech membership overview
 
Enterprise solution design principles
Enterprise solution design principlesEnterprise solution design principles
Enterprise solution design principles
 
Resume A
Resume AResume A
Resume A
 

Más de John Macasio

Más de John Macasio (20)

Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
 
Project Management Competency Guide for Digital Transformation
Project Management Competency Guide for Digital TransformationProject Management Competency Guide for Digital Transformation
Project Management Competency Guide for Digital Transformation
 
Teacher Work from Home with Learning Management System
Teacher Work from Home with Learning Management SystemTeacher Work from Home with Learning Management System
Teacher Work from Home with Learning Management System
 
Online Distance Learning Readiness Assessment
Online Distance Learning Readiness AssessmentOnline Distance Learning Readiness Assessment
Online Distance Learning Readiness Assessment
 
Social Media of Online Distance Learning with Networked Learner
Social Media of Online Distance Learning with Networked LearnerSocial Media of Online Distance Learning with Networked Learner
Social Media of Online Distance Learning with Networked Learner
 
GCIO Competency Model
GCIO Competency ModelGCIO Competency Model
GCIO Competency Model
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the Workplace
 
Learn with the Millenials
Learn with the MillenialsLearn with the Millenials
Learn with the Millenials
 
Enterprise Architecture Formulation template
Enterprise Architecture Formulation templateEnterprise Architecture Formulation template
Enterprise Architecture Formulation template
 
Social Media at Workplace
Social Media at WorkplaceSocial Media at Workplace
Social Media at Workplace
 
E services Strategic Planning with Enterprise Architecture
E services Strategic Planning with Enterprise ArchitectureE services Strategic Planning with Enterprise Architecture
E services Strategic Planning with Enterprise Architecture
 
E-School Project
E-School ProjectE-School Project
E-School Project
 
E-Service Planning and Enterprise Architecture
E-Service Planning and Enterprise ArchitectureE-Service Planning and Enterprise Architecture
E-Service Planning and Enterprise Architecture
 
ICT Project Management Status Checklist
ICT Project Management Status ChecklistICT Project Management Status Checklist
ICT Project Management Status Checklist
 
E-Services Planning and Enterprise Architecture Primer
E-Services Planning and Enterprise Architecture PrimerE-Services Planning and Enterprise Architecture Primer
E-Services Planning and Enterprise Architecture Primer
 
E-Gov Project Management Essentials
E-Gov Project Management EssentialsE-Gov Project Management Essentials
E-Gov Project Management Essentials
 
Basic Thinking Tool for E-Services Planning
Basic Thinking Tool for E-Services PlanningBasic Thinking Tool for E-Services Planning
Basic Thinking Tool for E-Services Planning
 
E-Governance and ICT for Government Managers
E-Governance and ICT for Government ManagersE-Governance and ICT for Government Managers
E-Governance and ICT for Government Managers
 
Mobile Presence of Governance and Management
Mobile Presence of Governance and ManagementMobile Presence of Governance and Management
Mobile Presence of Governance and Management
 
GCIO Competency and Training
GCIO Competency and TrainingGCIO Competency and Training
GCIO Competency and Training
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Enterprise Architecture and Information Security

  • 2. Is information security built-in or add-on in the plan, design and execution of information and communication systems?
  • 3. Information Security Requirements INFORMATION MANAGEMENT INFORMATION SECURITY Confidentiality Integrity Availability 1. Create 2. Store 3. Utilize 4. Share 5. Dispose
  • 4. ENTERPRISE ARCHITECTURE INFORMATION SECURITY ENTERPRISE ARCHITECTURE INFORMATION SECURITY PRINCIPLES LEGAL TECHNICAL GOVERNANCE PROCESS DATA APPLICATION TECHNOLOGY
  • 5. ENTERPRISE • "Enterprise" is an entity defined and organized to create value • The value creation is structured to be composed of product, services, people, location, performance, function, process, data, application, technology, infrastructure and providers. johnmacasio@gmail.com
  • 6. ARCHITECTURE • Speaks of drawn model to describe the holistic and particular view of the system in actualizing the “value” defined for the organization. • Blueprint which define the baseline of common and differentiated information on how the system is organized and expected to behave to actualize the mandate, mission, principles, vision, goals, objectives and performance. johnmacasio@gmail.com
  • 7. Need for Enterprise Architecture johnmacasio@gmail.com
  • 8. Need for Enterprise Architecture johnmacasio@gmail.com
  • 9. Need for Enterprise Architecture johnmacasio@gmail.com
  • 10. Need for Enterprise Architecture johnmacasio@gmail.com
  • 11. Need for Enterprise Architecture johnmacasio@gmail.com
  • 12. Need for Enterprise Architecture johnmacasio@gmail.com
  • 13. Need for Enterprise Architecture johnmacasio@gmail.com
  • 14. Need for Enterprise Architecture johnmacasio@gmail.com
  • 15. Need for Enterprise Architecture johnmacasio@gmail.com
  • 16. VALUE OF ENTERPRISE ARCHITECTURE “You are going to do architecture, because without architecture, you cannot do any of these things: • Alignment • Integration • Change • Reduced Time-to-Market -John Zachman Enterprise Architecture Framework johnmacasio@gmail.com
  • 17. VALUE OF ENTERPRISE ARCHITECTURE ALIGNMENT • Enterprise architecture provides the framework to enable better alignment of business and information technology objectives. The architecture used can also serve as a communication tool.
  • 18. VALUE OF ENTERPRISE ARCHITECTURE INTEGRATION • Enterprise architecture establishes the infrastructure that enables business rules to be consistently applied across the organization, documents data flows, uses and interfaces.
  • 19. VALUE OF ENTERPRISE ARCHITECTURE VALUE CREATION • Enterprise architecture provides better measurement of information technology economic value in an environment where there is a higher potential for reusable hardware and software assets
  • 20. VALUE OF ENTERPRISE ARCHITECTURE CHANGE MANAGEMENT • Enterprise architecture establishes consistent infrastructure and formalizing the management of the infrastructure and information assets better enables an organization-wide change management process to be established to handle information technology changes
  • 21. VALUE OF ENTERPRISE ARCHITECTURE COMPLIANCE • Enterprise architecture provides the artifacts necessary to ensure legal and regulatory compliance for the technical infrastructure and environment. - Schekkerman, J. (2005). Trends in Enterprise Architecture, Institute for Enterprise ArchitectureDevelopment
  • 22. ENTERPRISE ARCHITECTURE DOMAIN TECHNOLOGY INFRASTRUCTURE INFORMATION DATA & APPLICATION BUSINESS FUNCTIONS PROCESS & POLICIES ORGANIZATION & STAKEHOLDERS MANDATE VISION GOALS PROGRAMS 1. Intention 2. Business 3. Information 4. Technology johnmacasio@gmail.com
  • 23. ARCHITECTURE DOMAINS 1. BUSINESS ARCHITECTURE Definition of the business strategy, governance, organization, and key business processes of the enterprise 2. APPLICATION ARCHITECTURE Provision of functional blueprint for the individual application system to be deployed, the interaction between application system, and their relationship to the core business processes of the enterprise johnmacasio@gmail.com
  • 24. ARCHITECTURE DOMAINS 3. DATA ARCHITECTURE Structural definition of the logical and physical data assets of the enterprise, and the associate data management resources. 4. TECHNOLOGY ARCHITECTURE Definition of the hardware, software and network infrastructure to support the deployment of core and mission-critical applications. It includes description of technology standards and methodology. johnmacasio@gmail.com
  • 25. ENTERPRISE ARCHITECTURE COMPONENTS IN ICT SERVICES USE CASE APPLICATION SYSTEM DATA SERVICES APPLICATION SERVICES CONNECTIVITY SERVICES USERS ACCESS BUSINESS PROCESSES MEMBERSHIP COLLECTION BENEFITS ACCREDITATION DATA ELEMENTS DATABASE SYSTEM NETWORK INFRASTRUCTURE POINT OF PRESENCE CUSTOMER CLIENTS PROVIDERS SUPPLIERS johnmacasio@gmail.com
  • 26. E Membership Collection Benefits Accreditation CUSTOMER RELATIONSHIP MANAGEMENT ENTERPRISE RESOURCE PLANNING Planning Audit Risks Legal/Policy ENTERPRISE PERFORMANCE MANAGEMENT Finance Human Resource Assets Facilities Technology DATA APPLICATION BUSINESS PROCESS TECHNOLOGY INFRASTRUCTURE CASE: BUSINESS INFORMATION SYSTEM INTEGRATION VIEW INFORMATION SECURITY E N T E R P R I S E A R C H I T E C T U R E johnmacasio@gmail.com
  • 27. SUCCESS COMPONENTS OF INFORMATION SYSTEM Agency Citizen DeLone and McLean Model johnmacasio@gmail.com
  • 28. Enterprise Architecture Information Security Questions Information Security Principles Information Security Risks Information Security Methodology BUSINESS FUNCTION PROCESS BUSINESS DATA & APPLICATION BUSINESS TECHNOLOGY INFRASTRUCTURE ENTERPRISE INFORMATION SECURITY johnmacasio@gmail.com Information Security Governance NETWORKED INFORMATION SUPPLIER & CUSTOMER
  • 29. Information Security Means… Information Security Confidentiality Availability Integrity Secrecy, Privacy and Authority Accurate, Complete and Reliable Accessible, Immediate and Uptime johnmacasio@gmail.com
  • 30. johnmacasio@gmail.com Information Insecurity Means… StolenMisrepresented Breached Information is not secure when something is Misused IncompleteUnauthorized Compromised Denied
  • 31. CASE: HEALTH INSURANCE INFORMATION SECURITY MEMBERSHIP MANAGEMENT COLLECTION MANAGEMENT BENEFITS MANAGEMENT ACCREDITATION MANAGEMENT payment identification claims certification johnmacasio@gmail.com
  • 32. CASE: HEALTH INSURANCE INFORMATION SECURITY FINANCIAL MANAGEMENT PERSONNEL MANAGEMENT ASSET MANAGEMENT LEGAL MANAGEMENT johnmacasio@gmail.com
  • 33. CASE: HEALTH INSURANCE INFORMATION SECURITY AUDIT MANAGEMENT STRATEGY MANAGEMENT RISK MANAGEMENT PROJECT MANAGEMENT johnmacasio@gmail.com
  • 34. CASE: HEALTH INSURANCE INFORMATION SECURITY INFRASTRUCTURE MANAGEMENT NETWORK MANAGEMENT APPLICATION MANAGEMENT DATA MANAGEMENT johnmacasio@gmail.com
  • 35. Mitigating Information Security Risk Information Security Risk Mitigation Assessment Policy Governance Technology johnmacasio@gmail.com Why Who What How
  • 36. Security Policy Requirement Governance •Functional Organization •Roles and Responsibilities Competencies •Knowledge, Skills and Attitudes Requirements •Training Program and Certification Process •Business Workflow, Procedures and Rules •Risk Audit and Control Procedures Data Infrastructure •Acceptable Use •Data Management •Risk Audit and Control Procedures •Infrastructure Management •Sourcing & Procurement •Risk Audit and Control Governance Guidance and Implementation Competency Reference and Assessment Functions Process Models and Control Guidance Data and Application Security Models and Acceptable Use Physical Configuration Network Models Service Sourcing Trusted Technology Acceptable Use No Need to Reinvent the Wheel 1. Recognize security needs & question 2. Find the fitted practitioner standards 3. Apply standards to real life condition 4. Assess and improve the practice johnmacasio@gmail.com Governance Competency Process Data Infrastructure
  • 37. Information Security Risk Assessment Information Asset Inventory (Information Systems) Risk Mitigation Treatment Prevention Impact Rating of Vulnerability Identification Vulnerability Threat Source johnmacasio@gmail.com 1. Organization 2. Process 3. Data 4. Application 5. Infrastructure
  • 38. What it means to secure information… 1. Establish the governance and management organization of information security that comply to best practice standards. johnmacasio@gmail.com
  • 39. What it means to secure information… 2. Identify the information assets, and perform the assessment of vulnerabilities and threats that surround the creation, storage, use and sharing of information. johnmacasio@gmail.com
  • 40. What it means to secure information… 3. Develop, document and implement policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability in the person, process, data, application and infrastructure of information. johnmacasio@gmail.com
  • 41. What it means to secure information… 4. Evaluate, acquire and use security management tools to classify data and risk, to audit information system, to assess and analyze risks in the solution development and infrastructure, to monitor and control areas of vulnerabilities. and implement security controls and appropriate reactive responses to threats. johnmacasio@gmail.com
  • 42. Basic Security Steps Authorized Access Device Integrity Data Exchange Protocol Monitoring & Audit Network Hardening Service Agreements Information Systems Security Standards Risk Assessment & Policies Security Services User Training johnmacasio@gmail.com
  • 43. CHANGE… 1. We can only evaluate that which is measurable 2. We can only test that which is agreed. 3. We can only improve that which is actualized. 4. We can only change that which is established. johnmacasio@gmail.com

Notas del editor

  1. Manual re-keying Manual re-keying might not be the biggest cost companies pay from bad architecture, but it’s certainly the most obvious one. Hiring human beings to serve as the interface engine connecting incompatible applications isn’t just expensive; it’s de-humanizing.
  2. Collection of point solutions Everyone wants their work supported by a “best of breed” solution. Define “their work” too narrowly, though, and everyone has to visit so many applications to get their work done that there isn’t enough time to get their work done. Meanwhile, unless IT spends a lot of time building interfaces to connect all of these point solutions, you’re back to re-keying again.
  3. Redundant applications Every business application solves business problems. Solving business problems is good, so solving them more than once must be even better, right? Of course not, and yet a lot of companies keep lots of redundant applications around, either because they overlap but still have a few unique areas they support, or because they’ve grown through mergers and acquisitions but aren’t very good at integrating everyone into one business after the papers have been signed. Either way, the money spent to support all of this redundancy is pure waste.
  4. Redundant data Very often, different applications need the same information to get their jobs done. You have two choices: Point them all to the same underlying database, which isn’t always possible, or synchronize their separate databases, which is often pretty messy. Or there’s always that manual re-keying option....
  5. Too many interfaces When you have redundant data and you decide to keep it synchronized, you need to build an interface. Even if you don’t, you often have to feed one system with results from a different one. Either way, the more systems and databases you have, the more interfaces you end up building. It’s better than not having them, but as they accumulate, your architecture becomes more and more fragile, and you spend more and more time managing the interfaces instead of building new functionality.
  6. Faux-elegant integration So you decide to solve your interface dilemma with an elegant enterprise application integration system, or a services bus, or some other form of middleware-plus-metadata that keeps everything clean. And then, your developers figure two things out: (1) what your cool new system does is make solving the easy problems even easier; and (2) it doesn’t solve the hard problems at all. So instead of arguing with you, they rebuild the same old spiderweb of interfaces, but hide it inside the EAI system so you don’t know about it.
  7. Kludges and workarounds Maybe you were competing with an outside developer who lowballed a project. Maybe the business sponsor insisted on too short a deadline. Or maybe building a solution well would have ruined the business case for the project. Whatever the reason, you wake up one day to discover a lot of your systems are held together with Band-Aids, chewing gum, and duct tape. If you’re lucky, nobody will notice until after you leave or retire.
  8. Obsolete technology It’s mission-critical! It satisfies the business need perfectly! What do you mean you have to spend money to maintain it? When you’ve built something on a version of Visual Basic that Microsoft hasn’t supported in a decade, that can’t read and write from any version of SQL Server that isn’t at least seven years old, and the only versions of Windows they’ll run on don’t have drivers for any of the printers you have in production -- that’s what you mean. You have to spend money to maintain it.
  9. White papers You see a bunch of warning signs. You organize an enterprise technical architecture management group. You hire an expert or two. And their productivity is enormous. Enormous, that is, if you measure productivity in terms of the number of white papers they publish. Changing how work gets done in IT? Of course they’ll change it. So long, that is, as everyone reads their white papers, admires their business, and follows their instructions.
  10. Confidentiality: This means that information is only being seen or used by people who are authorized to access it. Integrity: This means that any changes to the information by an unauthorized user are impossible (or at least detected), and changes by authorized users are tracked. Availability: This means that the information is accessible when authorized users need it.