Enterprise Level Security – Basic Security Model

Maintaining, updating, and modifying such a system based on changing enterprise needs and advancing technology is even more challenging. Decisions and informal rules that were made and enacted in the initial build are often lost, forgotten, or ignored when changes are needed. When the original syste...

Full description

Bibliographic Details
Main Authors: Kevin E. Foltz, William R. Simpson
Format: Article
Language:English
Published: International Institute of Informatics and Cybernetics 2016-02-01
Series:Journal of Systemics, Cybernetics and Informatics
Subjects:
Online Access:http://www.iiisci.org/Journal/CV$/sci/pdfs/ZA188FH16.pdf
_version_ 1818560293735759872
author Kevin E. Foltz
William R. Simpson
author_facet Kevin E. Foltz
William R. Simpson
author_sort Kevin E. Foltz
collection DOAJ
description Maintaining, updating, and modifying such a system based on changing enterprise needs and advancing technology is even more challenging. Decisions and informal rules that were made and enacted in the initial build are often lost, forgotten, or ignored when changes are needed. When the original system designers have moved on, the system is entrusted to an administrator who understands how the system works but not why it was designed to work that way. Without this higher-level understanding, the secure system devolves into a collection of loosely integrated partial solutions with security vulnerabilities at the seams and edges. This work presents a method of documenting the design logic of a secure enterprise information system, from basic principles to implementable requirements. Important design decisions are captured, along with the logic supporting them. Before changes to the system are made, an assessment is made against the core design decisions to ensure the original security goals are maintained. This provides clarity to the system owner and administrators to help guide future changes, and it provides a way to convey security goals to product vendors in a structured and logical way, which can help to reduce the back-and-forth arguing over whether a product meets security requirements. The Enterprise Level Security (ELS) architecture is used as an example of the application of this method to a real-world security system
first_indexed 2024-12-14T00:36:38Z
format Article
id doaj.art-e7478fb2fe7d44dca66fa1ac7f4ff51c
institution Directory Open Access Journal
issn 1690-4524
language English
last_indexed 2024-12-14T00:36:38Z
publishDate 2016-02-01
publisher International Institute of Informatics and Cybernetics
record_format Article
series Journal of Systemics, Cybernetics and Informatics
spelling doaj.art-e7478fb2fe7d44dca66fa1ac7f4ff51c2022-12-21T23:24:36ZengInternational Institute of Informatics and CyberneticsJournal of Systemics, Cybernetics and Informatics1690-45242016-02-011417479Enterprise Level Security – Basic Security ModelKevin E. FoltzWilliam R. SimpsonMaintaining, updating, and modifying such a system based on changing enterprise needs and advancing technology is even more challenging. Decisions and informal rules that were made and enacted in the initial build are often lost, forgotten, or ignored when changes are needed. When the original system designers have moved on, the system is entrusted to an administrator who understands how the system works but not why it was designed to work that way. Without this higher-level understanding, the secure system devolves into a collection of loosely integrated partial solutions with security vulnerabilities at the seams and edges. This work presents a method of documenting the design logic of a secure enterprise information system, from basic principles to implementable requirements. Important design decisions are captured, along with the logic supporting them. Before changes to the system are made, an assessment is made against the core design decisions to ensure the original security goals are maintained. This provides clarity to the system owner and administrators to help guide future changes, and it provides a way to convey security goals to product vendors in a structured and logical way, which can help to reduce the back-and-forth arguing over whether a product meets security requirements. The Enterprise Level Security (ELS) architecture is used as an example of the application of this method to a real-world security systemhttp://www.iiisci.org/Journal/CV$/sci/pdfs/ZA188FH16.pdf EnterpriseSecurity ConceptsIT Security IntegritySecurity TenetsSecurity Requirements
spellingShingle Kevin E. Foltz
William R. Simpson
Enterprise Level Security – Basic Security Model
Journal of Systemics, Cybernetics and Informatics
Enterprise
Security Concepts
IT Security
Integrity
Security Tenets
Security Requirements
title Enterprise Level Security – Basic Security Model
title_full Enterprise Level Security – Basic Security Model
title_fullStr Enterprise Level Security – Basic Security Model
title_full_unstemmed Enterprise Level Security – Basic Security Model
title_short Enterprise Level Security – Basic Security Model
title_sort enterprise level security basic security model
topic Enterprise
Security Concepts
IT Security
Integrity
Security Tenets
Security Requirements
url http://www.iiisci.org/Journal/CV$/sci/pdfs/ZA188FH16.pdf
work_keys_str_mv AT kevinefoltz enterpriselevelsecuritybasicsecuritymodel
AT williamrsimpson enterpriselevelsecuritybasicsecuritymodel