CIO Council issues third version of FEA security/privacy profile
Connecting state and local government leaders
In the latest version of the Federal Enterprise Architecture Security and Privacy Profile, the CIO Council for the first time gives agencies a document that is built from reality.
In the latest version of the Federal Enterprise Architecture Security and Privacy Profile, the CIO Council for the first time gives agencies a document that is built from reality.
Unlike many FEA profiles, two agencies tested the validity of Version 2 of the Security and Privacy document. The Justice and Housing and Urban Development departments undertook a four-month trial to see how the updated methodologies to add security and privacy to agency EAs worked.
'The current version was modified based on validation exercises and an assessment of related documents,' the profile states. 'Validation consisted of abbreviated applications of the FEA SPP methodology.'
This is the third version of the profile the CIO Council released that complements the federal architecture methodology. The council issued the first one in August 2004 and again in July 2005.
This profile cuts across all five layers of the FEA' business, service component, performance, technical and data reference models. The CIO Council also has issued similar profiles for records management and geospatial information.
The security and privacy profile moves the agencies toward addressing these issues from a 'business-centric, enterprise perspective.' The profile, the CIO Council hopes, will integrate 'disparate perspectives of program, security, privacy and capital planning into a coherent process, using an organization's enterprise architecture efforts.'
In short, the profile:
- Promotes an understanding of the organization's security and privacy requirements, its capabilities to meet those requirements and the risks to its business;
- Helps program executives select the best way to meet the requirements and improve current capabilities, using standards and services that are common to the enterprise or government;
- Improves agencies' processes for incorporating privacy and security into major investments.
- Identify the program's needs and capabilities;
- Analyze how to effectively address those needs with a consideration to using existing systems to reduce costs;
- Select the tools to improve the security and privacy of system including ensuring the agency has asked for adequate funding and the effort is coordinated across the department.
NEXT STORY: DARPA taps Analex for security services