I attended the Open Rights Group Conference (ORGCon) this year. We are at a weird moment where the Internet and the associated digital technologies it has spawned and supported are wreaking changes to the social, cultural and economic environment that don’t easily fit the current models of law and governance.…
Month: March 2012
Documenting an As-Is Security Architecture, part two
This is a continuation from part one. Documenting current environments This activity is focused on identifying the physical and logical environments in scope for the business architecture. A logical and physical model will be created to hold entities describing physical facilities, wide area networks and systems that store, process or…
Documenting an As-Is Security Architecture, part one
This is the first of a two part post, part two is available here. The following list is a set of activities that need to completed at least once to document an existing As-Is security architecture view for a business architecture and then need to be maintained over time through…