Information Security Architecture: An Integrated Approach to Security in the Organization


Posted on by Ben Rothke

Information Security Architecture: An Integrated Approach to Security in the Organization is a good foundation upon which to build a security architecture. 

Architecture is the art and science of designing buildings and other structures. Using some creative license, it also encompasses the design of any entity, including information systems and their security components. But while no one would build a building without an architect, IT departments routinely design computer systems without considering the security architecture, instead believing that firewalls and other devices are quick and durable fixes.  

Nothing could be further from the truth. In Information Security Architecture, author Jan Killmeyer Tudor shows that an effective and comprehensive information security infrastructure is best developed within the framework of an information security architecture (ISA), given today's distributed nature of client/server computing. In the past, when systems were closed and proprietary, security wasn't as compelling a need as it is in today's open systems. 

The book covers important ISA issues such as the nature of the organization, policies and standards, baselines and risk assessment, awareness and training, compliance, and more. An underlying message is that these components must work in concert to form a cohesive ISA. Hardware and software are ineffective if they are not integrated into the ISA. 

A dominant theme throughout is that implementing security technologies requires an understanding not only of the technologies' return on investment to the organization but also of the risks and vulnerabilities related to these technologies. This ISA methodology gives security professionals an excellent method for achieving just that.

Given how important policy is to an ISA, the book has several appendices that include policies, procedures, and work plans. These provide a fine foundation upon which to build a security architecture.


Contributors
Ben Rothke

Senior Information Security Manager, Tapad

Identity

identity management & governance

Blogs posted to the RSAConference.com website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.


Share With Your Community

Related Blogs