Approved Standards for Security Domain

Security Domain

The following Disciplines, Technology Areas and Compliance Components have been approved as Enterprise Architecture blueprints for inclusion in the EA repository. As more documentation becomes a part of the overall governance and product standards, this list will expand accordingly.

DisciplineTechnology AreaProduct/Compliance Components
Management ControlsInformation Security PolicyInformation Security Policy [CC]
Personnel SecurityAgency Security Roles and Responsibilities [CC]
Background Screening [CC]
Maintaining User Accounts [CC]
Review of Security ControlsSeparation of Duties [CC]
System Life Cycle SecurityAcquisition and Development Phase [CC]
Disposal Phase [CC]
Implementation Phase [CC]
Initiation Phase [CC]
Enterprise Patch Management [CC]
Security Risk ManagementRisk Assessment [CC]
Risk Framework [CC]
Risk Monitoring [CC]
Risk Response [CC]
System Security Certification and AccreditationSystem Security Certification and Accreditation Process
System Security PlanningSystem Security Planning Procedure [CC]
Data IntegrityData Integrity and Validation [CC]
Hardware & System Software MaintenanceConfiguration Management [CC]
Incident ResponseIncident Response Reporting [CC]
Risk Level Awareness - Countermeasures [CC]
Physical SecurityPhysical and Environmental Protection Controls [CC]
Production, Input and Output ControlsUser Support [CC]
Security Awareness Training and EducationCyber Security Awareness Training[CC]
Security DocumentationMinimum System Security Documentation [CC]
Supply Chain Risk ManagementSupply Chain Risk Management Acquisition [CC]
Supply Chain Risk Management Plan [CC]
Operational ControlsContingency PlanningContingency Plan Development, Documentation and Technical Considerations [CC]
Contingency Plan Testing, Training, Exercises and Maintenance [CC]
Technical ControlsCryptographyCryptography [CC]
Digital Signature [CC]
Encryption Key Management [CC]
Hardware vs Software Encryption [CC]
Hashing [CC]
Public Key Infrastructure [CC]
Secret Key Cryptography [CC]
Identification / AuthenticationEntity Authentication [CC]
Electronic Signatures [CC]
Message Authentication [CC]
Password Controls [CC]
Securing Electronic Transactions [CC]
Strong Authentication [CC]
User Authorization [CC]
Intrusion Detection SystemsApplication Based IDS [CC]
Encryption for Laptops [CC]
Host Based IDS [CC]
Network Based IDS [CC]
Network Intrusion Prevention Systems (IPS) [CC]
Logical Access ControlsAccess Controls [CC]
Date/Time Controls [CC]
Inactivity Controls [CC]
Logon Banners [CC]
Remote Access ControlsSecuring Remote Connections [CC]
Securing Mobile Devices [CC]
Security for Voice Over Internet Protocol (VOIP) [CC]
Securing Web Browsers [CC]
Virtual Private Networks (VPNs) [CC]
Secure Gateways & FirewallsApplication - Proxy Gateway Firewalls [CC]
Firewall Administration [CC]
Dedicated Proxy Servers [CC]
Firewall Environments [CC]
Firewall Rules [CC]
Firewall Selection [CC]
Packet Filter Firewalls [CC]
Personal Firewalls [CC]
Stateful Inspection Firewalls [CC]
Virus Detection & EliminationsCriteria for E-mail [CC]
Criteria for Gateways [CC]
Criteria for Server [CC]
Criteria for Wireless [CC]
Criteria for Workstation [CC]
Virus Management Tools Criteria [CC]
Virus Policy & Best Practices [CC]