A challenge of the framework is complexity. This
is raised more than five times and through deeper
analysis it is noted that the participants most
challenged by the complexity of security do not have
security experience. Comments from participants
include “quite complex”, “the large number of boxes
diminishes the simplicity of the approach”, “it is
complex but is intuitive, logical and easy to use” and
“scalable and adaptable to any organisation”.
Other comments that although were not thematic
are worthy of noting for the future evolution of the
framework include the need for a practical
implementation toolset such as a gap assessment
workbook / a user manual, and testing the framework
within an organisation. Overall the feedback is
supportive and comments from the participants
include “definitions, artefacts, models and references
are a very strong tool”, “could easily continue on and
become a commercial product” and “fantastic
concept that provides a single awareness view for all
security”.
7 CONCLUSIONS
In security, the whole is clearly greater than the sum
of its parts and security has never been more
important. The development of the concept of a
holistic enterprise security architecture, highlights
that security is not just technical but requires a
focusing on all the organisational assets of people,
technology and processes, which will provide
enterprise security management guidance to
contemporary digitalised organisations of the 21st
Century. The benefits of a holistic approach require
all aspects of security to be considered and
implemented based on the budget, size and
mechanisms of the organisation, and provides a
reduction in responsibility confusion and appropriate
resourcing. We conducted a review of 25 security
frameworks to determine if a fully researched and
holistic security methodology would better provide
security benefits to organisations than a piecemeal
approach. The review indicated that there were very
few frameworks that met the holistic test and
therefore the research question could not be answered
without a new framework being created. From the
review, we took recommendations to guide the
framework development – inclusion of all security
mechanisms, compliant to international security
standards, using EA as the foundation and
organisationally holistic in its implementation.
We develop the Security Architecture Framework
for Enterprises (SAFE) using the Design Science
Research method. The framework is based on the
John Zachman 2013 Version 3.0 and its layers of
abstraction were developed with supporting
documentation. The completed framework (Figure 3)
is a 6 x 6 framework and each cell was defined using
1) a detailed explanation, 2) pictorial model, 3)
framework example in the real world and 4)
compliance mapping to ISO 27000 and NIST.
To determine the effectiveness of our framework
in meeting security concerns, we shared the
framework and supporting documentation with
industry professionals using a questionnaire to
evaluate. Our analysis of the questionnaire responses
identified that the evaluation of the security
framework indicates a positive correlation for the
improvement of organisational security if a holistic
design approach was applied.
To mature and evolve the design concept further
there would be benefit from future work such as a
larger design study, a user manual, a case study in a
company or an organisational implementation study.
REFERENCES
Anderson, J. A., & Rachamadugu, V. (2008). Managing
security and privacy integration across enterprise
business process and infrastructure. Paper presented at
the IEEE SCC.
Anderson, R. (2008). Security engineering: John Wiley &
Sons.
Angelo, S. (2001). Security Architecture Model
Component Overview. Sans Security Essentials.
Atoum, I., Otoom, A., & Abu Ali, A. (2014). A holistic
cyber security implementation framework. Information
Management & Computer Security, 22(3), 251-264.
Bente, S., Bombosch, U., & Langade, S. (2012).
Collaborative enterprise architecture: enriching EA
with lean, agile, and enterprise 2.0 practices: Newnes.
Bernroider, E. W., Margiol, S., & Taudes, A. (2016).
Towards a General Information Security Management
Assessment Framework to Compare Cyber-Security of
Critical Infrastructure Organizations. Paper presented
at the Research and Practical Issues of Enterprise
Information Systems: 10th IFIP WG 8.9 Working
Conference, CONFENIS 2016, Vienna, Austria,
December 13–14, 2016, Proceedings 10.
DiMase, D., Collier, Z. A., Heffner, K., & Linkov, I. (2015).
Systems engineering framework for cyber physical
security and resilience. Environment Systems and
Decisions, 35(2), 291-300.
Eloff, J., & Eloff, M. (2005). Information security
architecture. Computer Fraud & Security, 2005(11),
10-16.
Ertaul, L., & Sudarsanam, R. (2005). Security planning
using Zachman framework for enterprises Paper
presented at the EURO mGOV 2005