The Security Architecture Policy requires agencies to securely and economically protect transaction of the State's business, delivery of services, and communications among citizens, businesses, political sub-divisions, and the federal government. It encourages the state and individual agencies to incorporate technology security improvements for business requirements without compromising the security, integrity, and performance of the enterprise and its information resources.
Security Architecture provides the framework and foundation to enable secure communication, protect agency business processes and information resources, and ensures that new methods for delivering service are secure. Numerous statewide security standards address the elements contained in the statewide Technology Infrastructure and Security Assessment (TISA).
Arizona’s adaptive Security Architecture identifies the basic services needed to address security in both the current electronic environment and in future, anticipated electronic environments. Agencies are working to preserve the integrity, reliability, availability, and confidentiality of important information while maintaining their information systems. The most effective way to protect information and systems is to incorporate security into each domain of EA. This approach, depicted below, ensures that security supports agency business operations, thus facilitating those operations, and that plans to fund and manage security are built into life-cycle budgets for IT.
While applicable security elements are incorporated into domain technical standards, the Security Architecture domain defines both technologies and rules of behavior to securely and economically protect IT assets and resources.
No comments:
Post a Comment