January 7, 2001, The new millennium
Welcome to the latest issue of the
Enterprise-Wide IT Architecture Newsletter!Supporting the Enterprise-Wide IT Architecture (EWITA) web site at http://www.ewita.com/
Editorial - Keeping it (EWITA) going
New Millennium
Well, congratulations, you made it to the new millennium! I wasn't so sure I was going to make it as I watched the Rose Parade in a hotel room, ice bag to the head, nursing a cup of "coffee", looking forward to a New Years Brunch with the family! My wife and I went out to one of those all nighters with three bands and a lot repeat a LOT of booze.
Looking at the statistics for the site, I see where the accesses for December (a notorious slow time) went up almost a 75% over the prior year. Looks like we are growing.
And some more good news, the site has been upgraded from a three star rating to a fourstar rating by the itmWEB™ Resources for IT Professionals web site at
http://www.itmweb.com
Over the last year, I have gotten a lot of complements on the site, I think one of the best came in last week from the former CIO of North Carolina. She said "It contains so much useful information. I vote it as "best architecture reference" web site." Quite a compliment, obviously, grit for the
KUDOS mill. BTW, check out the KUDOS area (click on KUDOS off the main menu area) of the site to see what some of the comments others have about the site.Well, I have decided to try to keep the newsletter going myself, Steve Rodgers my associate will be putting articles in intermittently. It was necessary for him to give more attention to his new job and his family.
If you have read the newsletters before, you know I am working at a new career as a consultant's consultant at
ACCENTURE, the company formerly know as Andersen Consulting. It has been very interesting watching them rebrand themselves. From the little I saw previously when I established the EWITA site, I knew it would be a problem, but theirs is overwhelming, and it has been very well done. I will keep the newsletter going best I can, but even working part time for them is taking up most of my free time after the "Honey do's" that I seem to have gotten involved in since my "retirement" from the State of California.To keep the newsletter going, there will be some changes. The changes are:
There he goes again will be titled Editorial.
Site Spotlight will occur only when I find a new site that I feel will be of interest, you of course could recommend a site to look at.
Vendor Spotlight will occur only when I am contacted by a vendor to spotlight their site.
EWITA Web Site Changes will be deleted, you can find all changes to the site in the area called NEW on the main menu or in the administration area.
Hammering away in the garage will continue
Feedback will continue to reflect email and verbal comments received the prior month
Newsletters will be generated only in HTML, Word copies will not be generated
If you have articles, white papers, sites of interest, let us publish them to this exclusive list of IT architectural interested people. Forward articles, white papers and interesting sites to
mailto:ewita@ewita.com.------------------------------------------------------
Keeping it (EWITA) going
Architecting Security
None this issue -
Recommend a site to be reviewed.None this issue - Vendors, here is a chance to reach a selected audience of technical architects, send information to
EWITA.Responses to your comments and questions
------------------------------------------------------
Architecting Security
One of the most ignored, or at least downplayed, areas of IT is the matter of security.
This article is an attempt to address that area.
I have worked in shops where security was a matter of obfuscation. Just because we had a weird (technical term) file design we felt, that if anyone accessed the files, the data would remain secure. This was in the old days when everyone did not have a computer. It was a hobby of mine to figure out how I could make a million dollars from those files. Obviously I never did!
Most attention in the security area is concentrated on hackers, though most security breaches are by staff. In the State of California - Employment Development Department Business Driven Architecture (BDA), we created an Architecture Domain for security based on the British Standard (BS) 7799 addressing the following areas.
We used the British standard as we had an IBM guru in doing an audit that showed many of our weak points and he stated the standard was being considered by the IEEE organization. The standard was widely circulated in the organization because of that audit.
Since that attempt at codifying the security architecture, I have spent some time with other experts and a lot of time reading and analyzing the BS7799. I have developed the following table of Best Practices from that standard and my own experience.
Area |
Principle |
Best Practice |
Information security policy |
Provide management direction and support for information security |
|
Information security infrastructure |
Manage information security within the organization. |
|
Security of third party access |
Maintain the security of organizational information processing facilities and information assets accessed by third parties. |
|
Outsourcing |
Maintain the security of information when the responsibility for information processing has been outsourced to another organization. |
|
Accountability for assets |
Maintain appropriate protection of organizational assets. |
|
Security in job definition and resources |
Reduce the risks of human error, theft, fraud or misuse of facilities. |
|
User training |
Ensure that users are aware of information security threats and concerns, and are equipped to support organizational security policy in the course of their normal work. |
|
Responding to security incidents and malfunctions |
Minimize the damage from security incidents and malfunctions,
|
|
Secure areas |
Prevent unauthorized access, damage and interference to business premises and information. |
|
Equipment security |
Prevent loss, damage or compromise of assets and interruption to business activities |
|
General controls |
Prevent compromise or theft of information and information processing facilities. |
|
Operational procedures and responsibilities |
Ensure the correct and secure operation of information processing facilities |
|
System planning and acceptance |
Minimize the risk of systems failures |
|
Protection against malicious software |
Protect the integrity of software and information |
|
Housekeeping |
Maintain the integrity and availability of information processing and communication services. |
|
Network management |
Ensure the safeguarding of information in networks and the protection of the supporting infrastructure. |
|
Media handling and security |
Prevent damage to assets and interruptions to business activities.
|
|
Exchanges of information and software |
Prevent loss, modification or misuse of information exchanged between organizations. |
|
Business requirement for access control |
Control access to information |
|
User access management |
Prevent unauthorized access to information systems |
|
User responsibilities |
Prevent unauthorized user access |
|
Network access control |
Protect of networked services |
|
Operating system access control |
Prevent unauthorized computer access |
|
Application access control |
Prevent unauthorized access to information held in information systems. Security facilities is used to restrict access within application systems |
|
Monitoring system access and use |
Detect unauthorized activities |
|
Mobile computing and telecommuting |
Ensure information security when using mobile computing and telecommuting facilities. |
|
Security requirements of systems |
Ensure that security is built into information systems |
|
Security in application systems |
Prevent loss, modification or misuse of user data in application systems |
|
Cryptographic controls |
Protect the confidentiality, authenticity or integrity of information. |
|
Security in development and support processes |
Maintain the security of application system software and information |
|
Business continuity management |
Counteract interruptions to business activities and to protect critical business processes from the effects of major failures or disasters |
|
Compliance with legal requirements |
Avoid breaches of any criminal and civil law, statutory, regulatory or contractual obligations and of any security requirements. |
|
Reviews of security policy and technical compliance |
Ensure compliance of systems with organizational security policies and standards |
|
System audit considerations |
Maximize the effectiveness of and to minimize interference to/from the system audit process. |
|
According to
Deloitte & Touche "The British Standard for Information Security Management (BS 7799) is a set of non-technical protocols for ensuring the secure transmission of information."PriceWaterhouseCoopers
says "The aim of the BS 7799 is to provide guidance and recommendations on good practices for information security management. The BS 7799 is a compilation of the best information security practices in general use by many international companies."Additional Security whitepapers and references are available from
http://www.pgp.com/products/whitepapers.aspBTW: A question for those of you that have read to this point. Could a small organization have a architecture using only Best Practices and a Buy List? Or, what kind of architecture could a small organization have at a minimal expense?
Send any question, message, article or white paper to me, directly at dmcafee@ewita.com or the community address of EWIT_Architecture@egroups.com.
------------------------------------------------------
Got a good site that you would like to have spot lighted?
Send any recommendations to me, directly at
dmcafee@ewita.com or the community address of EWIT_Architecture@egroups.com.------------------------------------------------------
Got a good site that you would like to have spot lighted?
Send any recommendations to me, directly at
dmcafee@ewita.com or the community address of EWIT_Architecture@egroups.com.------------------------------------------------------
Request for information:
Comment: I don't know if it happens to others, but I have had a recurring problem when receiving your Newsletter... (has occurred in past editions). Thought I should alert you.
I am getting an overlay of information on the screen that looks something like a double exposure. It looks as if several separate pages are being written on top of each other. Perhaps the file has a carriage return or page break code that is going whacky? I will forward my copy back to you after this msg so that (if possible) you can see what's being generated. BTW-I am using Netscape.
Thanks for your continued collaboration!
Response: Yes, there is a incompatibility between Microsoft and Netscape, I think it is located in the Office 2000 interface for text in outlook. I will try something different this time, hopefully it will work. This is one of the reasons I started putting the newsletter on the site and sending out a message with pointers to it.
------
Comment: Congratulations!
Your site has been chosen as one of our "Five Star Selections" at the itmWEB Site! This is a real honor as very few sites get to display our award graphic. It will be featured in our Five Star Selections Listing. This Listing is composed of sites which either make an outstanding contribution to the Information Technology profession or which provide an exceptional on-line IT resource.
Response: Thanks, I appreciate that!
-------
Comment: I hadn't spent too much time surfing the web to find architecture examples since we published the NC architecture. Now that I've started this independent contract I found several NC-like architectures. I
really like your web site. It contains so much useful information. I vote it as "best architecture reference" web site.
Response: Thanks, again I appreciate that!
-------
Comment: I'm still receiving messages from your Listserv at my office address. It's ok, but I rather not receive them.
Response: Your address has been deleted from the mailing list as requested, however you may be receiving a copy through one of the Federal Listserv that I mail to. These are ARCH-BIZ@listserv.gsa.gov; ARCH-DATA@listserv.gsa.gov; ARCH-INFRA@listserv.gsa.gov; ARCH-SYS@listserv.gsa.gov; and ARCHITECTURES@listserv.gsa.gov
-------
Comment: First - impressive site! As you can tell, I am here on a Sunday afternoon searching the web getting clued into Enterprise Architecture. Your site is proving to ba a very valuable addition to what we have. Our project is new and this leads me to my second question - tools.
I have found several companies that provide tools that capture the architecture, but they all have limitations. Have you ever done research in this area? We are currently looking at PTech (Framework), Blue Ice (ERWin), Viasoft (Rochade), Popkin (Systems Architect 2001), and Microsoft (Visio). Any suggestions...? Thanks in advance.
Response: I haven't done any comparative research and am unaware of anyone that has done any, perhaps other readers of this newsletter could assist in this? We used Visio on the projects I have worked on, but as a simple charting device, not a database. I was impressed at some of the information I have seen from Ptech. Their product seemed that it could be tailored to an enterprise effort.
------
Feel free to add to any response, just email me the answer, I will include it in the next newsletter and forward directly to the person posing the question.
Readers: To respond, comment or ask questions send your comment to
dmcafee@ewita.com