We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
rea Albee) Vs) ste chitecture Matrix
Assets | Motivation | Process | People | Location | Time |
(What) (Why) (How) (Who) (Where) { (When)
4 ;
i siness Business Business Business
The eS BS Organization Geography Time
Risk Process g 7
Business Model Model and Relationships Dependencies
, Security Strategies} Security Entity Security Security-related
a OO eine rea | ontaade and Domain Lifetimes and
Profile Objectives Layering Trust Framework Model Deadlines
ir Entity Schema | Security Domain Security
somata Secunty Security and Privilege | Definitions and Processing
Model Policies Services Profiles Associations Cycle
= Security Rules, Users, Platform Control
ees aia Practices and ee Applications and | and Network Structure
nue Procedures the User Interface | Infrastructure Execution
Security | Identities, Processes, Security Step
Component setae a | Products —_| Functions, Actions | Nodes, Addresses Timing
and Tools and ACLs and Protocols {| and Sequencing
2 Assurance of Operational | Security Service | Application and Security of Security
Operational | operational Risk Management | User Management| Sites, Networks | Operations
Continuity Management and Support| and Support and Platforms Schedule
Source: Copyright SABSA institute, www. sabsa.org. Reproduced wi
ith permission.