Security Architecture Recommendation Tool

Author(s): Ian Mulholland, Frank Sargent

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

This tool guides organizations in evaluating the complexity of their IT environment, their operational maturity, and the perceived value of security architecture within their organization. It then suggests a security architecture maturity rating and provides an appropriate security architecture diagram template for that rating.

Instructions:

  1. Complete the Complexity, Operational, and Value Assessments on tabs 2, 3, and 4 respectively. Answer each question as accurately as possible. For the "Value Assessment" tab, have various relevant stakeholders give their answers to the questions provided and then amalgamate them into one assessment.
  2. Review the recommended security architecture maturity on the "Results" tab and read through the interpretations of the different maturity levels. Review the suggested security architecture diagram template. Use these results to support you in building a comprehensive set of initiatives to reach the target state.
  3. Read through the generated tab 6 to understand possible opportunities that would be effective in building and/or improving your security architecture. Select the "Year To Do" for each goal to generate a prioritized list in tab 7, "Roadmap." Look through this tab to review the goals and when they should be accomplished.

View the Complete Blueprint:

Identify Opportunities to Mature the Security Architecture

Security architecture does not have to be a shot in the dark.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019