Enterprise Architecture and Information Assurance

Book description

Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure enterprise architectures that integrate the most critical aspects of your organization's business processes.

Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates how to evaluate your network and business model to determine if they fit well together. The book’s comprehensive coverage includes:

  • Infrastructure security model components
  • Systems security categorization
  • Business impact analysis
  • Risk management and mitigation
  • Security configuration management
  • Contingency planning
  • Physical security
  • The certification and accreditation process

Facilitating the understanding you need to reduce and even mitigate security liabilities, the book provides sample rules of engagement, lists of NIST and FIPS references, and a sample certification statement. Coverage includes network and application vulnerability assessments, intrusion detection, penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning.

Reading this book will give you the reasoning behind why security is foremost. By following the procedures it outlines, you will gain an understanding of your infrastructure and what requires further attention.

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents
  4. Preface
  5. Acknowledgments
  6. Introduction (1/2)
  7. Introduction (2/2)
  8. About the Author
  9. Chapter 1 - Setting the Foundation
  10. Chapter 2 - Building the Enterprise Infrastructure (1/4)
  11. Chapter 2 - Building the Enterprise Infrastructure (2/4)
  12. Chapter 2 - Building the Enterprise Infrastructure (3/4)
  13. Chapter 2 - Building the Enterprise Infrastructure (4/4)
  14. Chapter 3 - Infrastructure Security Model Components (1/6)
  15. Chapter 3 - Infrastructure Security Model Components (2/6)
  16. Chapter 3 - Infrastructure Security Model Components (3/6)
  17. Chapter 3 - Infrastructure Security Model Components (4/6)
  18. Chapter 3 - Infrastructure Security Model Components (5/6)
  19. Chapter 3 - Infrastructure Security Model Components (6/6)
  20. Chapter 4 - Systems Security Categorization (1/6)
  21. Chapter 4 - Systems Security Categorization (2/6)
  22. Chapter 4 - Systems Security Categorization (3/6)
  23. Chapter 4 - Systems Security Categorization (4/6)
  24. Chapter 4 - Systems Security Categorization (5/6)
  25. Chapter 4 - Systems Security Categorization (6/6)
  26. Chapter 5 - Business Impact Analysis (1/3)
  27. Chapter 5 - Business Impact Analysis (2/3)
  28. Chapter 5 - Business Impact Analysis (3/3)
  29. Chapter 6 - Risk (1/2)
  30. Chapter 6 - Risk (2/2)
  31. Chapter 7 - Secure Configuration Management (1/4)
  32. Chapter 7 - Secure Configuration Management (2/4)
  33. Chapter 7 - Secure Configuration Management (3/4)
  34. Chapter 7 - Secure Configuration Management (4/4)
  35. Chapter 8 - Contingency Planning (1/5)
  36. Chapter 8 - Contingency Planning (2/5)
  37. Chapter 8 - Contingency Planning (3/5)
  38. Chapter 8 - Contingency Planning (4/5)
  39. Chapter 8 - Contingency Planning (5/5)
  40. Chapter 9 - Cloud Computing (1/2)
  41. Chapter 9 - Cloud Computing (2/2)
  42. Chapter 10 - Continuous Monitoring (1/4)
  43. Chapter 10 - Continuous Monitoring (2/4)
  44. Chapter 10 - Continuous Monitoring (3/4)
  45. Chapter 10 - Continuous Monitoring (4/4)
  46. Chapter 11 - Physical Security (1/4)
  47. Chapter 11 - Physical Security (2/4)
  48. Chapter 11 - Physical Security (3/4)
  49. Chapter 11 - Physical Security (4/4)
  50. Chapter 12 - Building Security (1/2)
  51. Chapter 12 - Building Security (2/2)
  52. Chapter 13 - Validating the Enterprise (1/4)
  53. Chapter 13 - Validating the Enterprise (2/4)
  54. Chapter 13 - Validating the Enterprise (3/4)
  55. Chapter 13 - Validating the Enterprise (4/4)
  56. Appendix A: References (NIST)
  57. Appendix B: References (FIPS)
  58. Appendix C: Sample Certification Statement
  59. Appendix D: Sample Rules of Engagement (1/2)
  60. Appendix D: Sample Rules of Engagement (2/2)
  61. Back Cover

Product information

  • Title: Enterprise Architecture and Information Assurance
  • Author(s): James A. Scholz
  • Release date: July 2013
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439841600