A challenge of the framework is complexity. This 
is raised more than five times and through deeper 
analysis it is noted that the participants most 
challenged by the complexity of security do not have 
security experience. Comments from participants 
include “quite complex”, “the large number of boxes 
diminishes the simplicity of the approach”, “it is 
complex but is intuitive, logical and easy to use” and 
“scalable and adaptable to any organisation”. 
Other comments that although were not thematic 
are worthy of noting for the future evolution of the 
framework include the need for a practical 
implementation toolset such as a gap assessment 
workbook / a user manual, and testing the framework 
within an organisation. Overall the feedback is 
supportive and comments from the participants 
include “definitions, artefacts, models and references 
are a very strong tool”, “could easily continue on and 
become a commercial product” and “fantastic 
concept that provides a single awareness view for all 
security”.
 
7 CONCLUSIONS 
In security, the whole is clearly greater than the sum 
of its parts and security has never been more 
important. The development of the concept of a 
holistic enterprise security architecture, highlights 
that security is not just technical but requires a 
focusing on all the organisational assets of people, 
technology and processes, which will provide 
enterprise security management guidance to 
contemporary digitalised organisations of the 21st 
Century. The benefits of a holistic approach require 
all aspects of security to be considered and 
implemented based on the budget, size and 
mechanisms of the organisation, and provides a 
reduction in responsibility confusion and appropriate 
resourcing. We conducted a review of 25 security 
frameworks to determine if a fully researched and 
holistic security methodology would better provide 
security benefits to organisations than a piecemeal 
approach. The review indicated that there were very 
few frameworks that met the holistic test and 
therefore the research question could not be answered 
without a new framework being created. From the 
review, we took recommendations to guide the 
framework development – inclusion of all security 
mechanisms, compliant to international security 
standards, using EA as the foundation and 
organisationally holistic in its implementation.  
We develop the Security Architecture Framework 
for Enterprises (SAFE) using the Design Science 
Research method. The framework is based on the 
John Zachman 2013 Version 3.0 and its layers of 
abstraction were developed with supporting 
documentation. The completed framework (Figure 3) 
is a 6 x 6 framework and each cell was defined using 
1) a detailed explanation, 2) pictorial model, 3) 
framework example in the real world and 4) 
compliance mapping to ISO 27000 and NIST.  
To determine the effectiveness of our framework 
in meeting security concerns, we shared the 
framework and supporting documentation with 
industry professionals using a questionnaire to 
evaluate. Our analysis of the questionnaire responses 
identified that the evaluation of the security 
framework indicates a positive correlation for the 
improvement of organisational security if a holistic 
design approach was applied.   
To mature and evolve the design concept further 
there would be benefit from future work such as a 
larger design study, a user manual, a case study in a 
company or an organisational implementation study. 
REFERENCES 
Anderson, J. A., & Rachamadugu, V. (2008). Managing 
security and privacy integration across enterprise 
business process and infrastructure. Paper presented at 
the IEEE SCC. 
Anderson, R. (2008). Security engineering: John Wiley & 
Sons. 
Angelo, S. (2001). Security Architecture Model 
Component Overview. Sans Security Essentials.  
Atoum, I., Otoom, A., & Abu Ali, A. (2014). A holistic 
cyber security implementation framework. Information 
Management & Computer Security, 22(3), 251-264.  
Bente, S., Bombosch, U., & Langade, S. (2012). 
Collaborative enterprise architecture: enriching EA 
with lean, agile, and enterprise 2.0 practices: Newnes. 
Bernroider, E. W., Margiol, S., & Taudes, A. (2016). 
Towards a General Information Security Management 
Assessment Framework to Compare Cyber-Security of 
Critical Infrastructure Organizations. Paper presented 
at the Research and Practical Issues of Enterprise 
Information Systems: 10th IFIP WG 8.9 Working 
Conference, CONFENIS 2016, Vienna, Austria, 
December 13–14, 2016, Proceedings 10. 
DiMase, D., Collier, Z. A., Heffner, K., & Linkov, I. (2015). 
Systems engineering framework for cyber physical 
security and resilience. Environment Systems and 
Decisions, 35(2), 291-300.  
Eloff, J., & Eloff, M. (2005). Information security 
architecture.  Computer Fraud & Security, 2005(11), 
10-16.  
Ertaul, L., & Sudarsanam, R. (2005). Security planning 
using Zachman framework for enterprises Paper 
presented at the EURO mGOV 2005