M4D1

Image of office folders with safe locks
Image Source: www.istockphoto.com

This activity will address module outcomes 1 and 3. Upon completion of this activity, you will be able to:

Identify the goals and objectives related to enterprise security architecture. (CO 1)
Identify the correlation among people, processes, and technology as they relate to EISA. (CO 1, 3, 5)
When considering how to best implement effective security across an enterprise, one approach starts by looking across the entire network structure and creating separate entities so that security gaps can be identified at every level and security subsequently implemented. There are other considerations when implementing enterprise security architecture. Some of these are discussed in the following reports from Microsoft.

Read through each report below:

Vilcinskas, M. (n.d.). Security entities building block architecture. Retrieved from https://msdn.microsoft.com/en-us/library/cc723497.aspx
Dodds, T., & Pfeil, K. (n.d.). Security considerations for end systems. Retrieved from https://msdn.microsoft.com/en-us/library/cc723491.aspx
Microsoft Developer Network. (n.d.). Security considerations for administrative authority. Retrieved from https://msdn.microsoft.com/en-us/library/cc723501.aspx
Based on the whitepapers as well as outside sources and class readings, respond to the following:

What are the goals and objectives of enterprise security architecture?
How does enterprise security architecture within the articles support business goals and strategy?
What are some of the important complexities to consider when developing the enterprise security architecture? Why?
Discuss the importance of people and their roles when creating an enterprise security architecture.
What is the relation between process and technology?