Cloud 101CircleEventsBlog
Get 50% off the Cloud Infrastructure Security training bundle with code 'unlock50advantage'

Research Topic

Enterprise Architecture

Enterprise Architecture Reference Diagram
Enterprise Architecture Reference Diagram

Download

Enterprise Architecture
Cloud security architecture helps cloud providers develop industry-recommended, secure and interoperable identity, access and compliance management configurations, and practices. The CSA Enterprise Architecture creates a common roadmap to meet the cloud security needs of your business. It is both a methodology and a set of tools that enable security architects, enterprise architects and risk management professionals to fulfill a set of common requirements that risk managers must use to assess the operational status of internal IT security and cloud provider controls. 

The CSA cloud computing architecture is guided by business requirements. 
In the case of the CSA Enterprise Architecture, these requirements come from the Cloud Controls Matrix (CCM) guided by regulations such as Sarbanes-Oxley, standards frameworks such as ISO-27002, the Payment Card Industry Data Security Standards, and the IT Audit Frameworks, such as COBIT, all in the context of cloud delivery models such as SaaS, PaaS and IaaS.

The CSA Enterprise Architecture was used as the basis for NIST security reference architecture (SP500-299, SP500-292). 

Enterprise ArchitectureConsensus AssessmentsCCAKCloud Controls Matrix

Discuss this topic in Circle

View discussion community

Cloud Security Research for Enterprise Architecture

CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.

Enterprise Architecture Reference Guide v2

Enterprise Architecture Reference Guide v2

This guide is your deep dive into each domain of CSA’s Enterprise Architecture (EA). CSA’s EA is both a methodology and a set of tools. It is a framework, a comprehensive approach for the architecture of a secure cloud infrastructure, and can be used to assess opportunities for improvement, create roadmaps for technology adoption, identify reusable security patterns, and assess various cloud providers and security technology vendors against a common set of capabilities. To create the CSA Enterprise Architecture, the EA Working Group leveraged four industry standard architecture models: TOGAF, ITIL, SABSA, and Jericho, therefore combining the best of breed architecture paradigms into a comprehensive approach to cloud security. By merging business drivers with security infrastructure, the EA increases the value proposition of cloud services within an enterprise business model.

Enterprise Architecture v2 to CCM v3 Mapping

Enterprise Architecture v2 to CCM v3 Mapping

The Enterprise Architecture (EA) is CSA’s standard cloud reference architecture, while the Cloud Controls Matrix (CCM) is CSA’s standard control set. By applying the CCM controls, an organization ensures that the EA is operating securely. However, until now, the link between the EA and CCM has never been demonstrated. This spreadsheet by CSA’s EA Working Group provides a mapping between the Enterprise Architecture 2.0 and Cloud Controls Matrix 3.0.1, showing how they can be used together to secure an enterprise architecture.

Enterprise Architecture to CCM Mapping Guide

Enterprise Architecture to CCM Mapping Guide

This document serves as an overview and explanation of the Enterprise Architecture v2 to CCM v3.0.1 Mapping. We first define the CSA Enterprise Architecture and CSA CCM, then demonstrate through example how the mapping was accomplished. After this, the mapping results are provided and explained in a summary.

Webinars

CCAK Webinar Series: Module 1 - Cloud Governance
CCAK Webinar Series: Module 1 - Cloud Governance

August 4 | Virtual

Learn more

CCAK Webinar Series: Module 2
CCAK Webinar Series: Module 2

August 11 | TBD

Learn more

CCAK Webinar Series: Modules 4 & 9
CCAK Webinar Series: Modules 4 & 9

August 18 | Online

Learn more

CCAK Webinar Series: Modules 3 & 7
CCAK Webinar Series: Modules 3 & 7

August 18 | Online

Learn more

Blog Posts

Evolutionary vs. Revolutionary Growth: Striking a Balance at Sunbelt Rentals
How CSA Research Uses the Cloud Controls Matrix to Address Diverse Security Challenges
What are the ISO 9001 Requirements?