Given the avalanche of security threats identified and directed daily at all sorts of corporate IT assets – PCs, midrange servers, mainframes, networks, storage systems, VoIP systems and cell phones, to list just a few – the case for effective, active management of these IT and networking security risks is a no-brainer. Issues of concern include interception, interruption, modification and fabrication of corporate information. Infractions may be inadvertent acts, deliberate nefarious acts, acts of God, technical failure and management malfeasance or failure.Some organizations have developed principle-based security architecture to define the necessary elements of security. However, many companies still take a piecemeal view of security management. What all organizations need is a comprehensive framework for the uniform and organized treatment of all aspects of security. This can be accomplished through a well-thought-out security architecture.An architecture is a blueprint for how to place resources optimally in the IT environment to support business, and security is a critical component. While the IT industry has come to accept enterprise architecture in the past five years, the focus has not been on security.Addressing security challenges effectively requires a proper overall security architecture and policy. Clearly, network hardware and software components must be secure, and personnel must be trustworthy. The goal of enterprise architecture is to create a unified IT environment – standardized hardware and software systems – across the company, with tight links to the business side of the organization. A security architecture should describe the security services a system must provide, the elements required to implement the services and the behaviors of the elements (including the performance goals) to deal with the threat environment. The security architecture should address administrative, communication, computer, radiation, personnel and physical security. An enterprise architecture in general, and a security architecture in particular, drive standardization and service improvement. Standardization results in lower operational costs and faster rollout of functions, whether they are atomic functions such as configuring a firewall or more complex integrated functions, such as a new software application.Layered frameworks and models for enterprise architecture have proved useful, because layering has the advantage of defining contained, non-overlapping partitions of the environment. One of the first security frameworks was ISO 7498-2, which covers general architectural elements that can be used to thwart attacks and circumstances under which the security elements can be used. But this model, published in 1989, is static; in addition, it covers general principles rather than detailed solutions. New models for robust security architecture planning are needed and, fortunately, some are under development. Related content news analysis Cisco uncorks AI-based security assistant to streamline enterprise protection With Cisco AI Assistant for Security, enterprises can use natural language to discover policies and get rule recommendations, identify misconfigured policies, and simplify complex workflows. By Michael Cooney Dec 06, 2023 3 mins Firewalls Generative AI Network Security news Nvidia’s new chips for China to be compliant with US curbs: Jensen Huang Nvidia’s AI-focused H20 GPUs bypass US restrictions on China’s silicon access, including limits on-chip performance and density. By Anirban Ghoshal Dec 06, 2023 3 mins CPUs and Processors Technology Industry news EU approves $1.3B in aid for cloud, edge computing New projects focus on areas including open source software to help connect edge services, and application interoperability. By Sascha Brodsky Dec 05, 2023 3 mins Technology Industry Edge Computing Cloud Computing brandpost Sponsored by HPE Aruba Networking Bringing the data processing unit (DPU) revolution to your data center By Mark Berly, CTO Data Center Networking, HPE Aruba Networking Dec 04, 2023 4 mins Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe