Csol 520 Assignment 2-Group 4-Enterprise Information Security Architecture
Csol 520 Assignment 2-Group 4-Enterprise Information Security Architecture
Aris Nicholas
Brandon Ivey
Kent Yang
Master of Science Cyber Security Operations and Leadership, University of San Diego
Assignment 2: Group 4
Table of Contents
Technology Goals 4
Technology Success Factors 5
Security Goals 6
Security Success Factors 6
Policies 8
Procedures 9
Standards 9
Guidance 11
Risk Appetite 12
Compliance requirements 13
Summary 14
References 15
3
Safe Harbor University's (SHU) mission is to provide the highest quality education for
Oceanic Studies. When the Covid pandemic occurred in the United States in January of 2020 and
shutdowns began in March of 2020, SHU learned the hard way that traditional in-class
instruction was not viable. Furthermore, SHU also desired to move to education and learning
online to keep pace with the modern world. To achieve this, SHU is committed to the
development of an online Learning Management System (LMS). This paper aims to define the
Enterprise goals, Technology goals, and Security goals so that policies, procedures, standards,
guidance, risk, and compliance requirements can be identified to support the development of the
SHU’s LMS.
The Enterprise Goals and Objectives are scoped to the business of delivering the highest
quality education for Oceanic Studies. Here are the high-level Enterprise goals:
The Enterprise goals outlined above are to ensure that SHU as an Educational Enterprise
operates well into the next century by continuing to meet the demands and challenges of a
modern world. Second, for the University to grow, the University must be able to increase
student enrollment, hire the best faculty, and perform innovative research. Third, education must
discuss the Technological goals that will act as enablers for the business goals, we will review
The key to defining success factors is that the success factor is measurable. To measure
the first goal of being a leading educational institution in Oceanic Studies, the college rankings
for SHU must be within the top 5 Universities according to independent reviews by third-party
publications such as U.S News Best Colleges. Measuring the sustained growth in the University,
students, and faculty goals are tracked from the enrollment numbers and employment records
year to year. Furthermore, the growth in research is measured by the grant awards, published
works, and patents received. Measure the accessibility of education goals by evaluating the
diversity of the faculty and student body using data collected on the student body and faculty
makeup.
Technology Goals
The technology goals are explicitly scoped to the solution for an online LMS and its
interface to external systems for authentication and enrollment verification. Here are the high-
level goals:
3. The software solution must scale to support increasing curriculum and students.
4. The software solution must integrate with existing systems and services, enrollment
To provide more context on the stated goals, to support the first goal of a web-based
solution is to have a system that supports multiple users on multiple platforms. The second goal
for an online LMS as a software solution is to ensure educational content delivery to support the
primary business goal of continuity in education delivery when the in-class option is not viable.
The third goal of application scaling is to support increasing online courses, faculty, and
students; therefore, consideration for a containerized application deployed to the cloud will help
to mitigate scalability requirements. The last goal of integrating with existing systems and
services to support the authentication and enrollment verification ensures the LMS software
aligns with functionality with existing infrastructure services such as single sign-on and
enrollment verification.
At the highest level, a measurable technology success factor for a web-based application
(downtimemonkey.com, 2018). The measurable technology success factor for LMS is a remotely
hosted solution (Software as a Service SaaS) that supports course content development and
management for 200 online course offerings. Additionally, the SaaS solution should be able to
support over 15,000 users (students, faculty, admin), which is the size of a medium college
(CollegeData & CollegeData, n.d.). To meet the success factor for scalability to increase in
course content and students, the LMS SaaS can dynamically scale to support additional courses
and users without increasing on-premises hardware infrastructure but understanding that
managed services cost with cloud providers may increase. Lastly, a measure of success in
integration with existing services and systems such as authentication and enrollment verification
Security Goals
The security goals are tied to the technological goals previously stated. Namely, web
application, hosted service, and integration with preexisting authentication and legacy enrollment
The first three security goals align with components of the security triad and are meant to
guide an organization's security policies and procedures (What Is the CIA Triad? Definition and
Examples, 2021). The last security goal covers communications with external systems,
Security success factors are achieved when the system meets the CIA triad of
implementing user authentication with policies in place to ensure authorized access. Successful
implementation of role-based access distinguishes different user roles such as Faculty, Student,
how well user data is protected from unauthorized disclosure. Integrity can be measured by how
secure the data is when protected from modification or destruction through encryption, whether
in transit or at rest. Additionally, how well communications and digital work are safeguarded and
7
requirements can be evaluated through the system's ability to meet minimum threshold uptime
requirements measured over time. Finally, access to external systems must be secure and
The following policies, procedures, and standards provide guidance on the objectives and
the appropriate actions necessary for obtaining the goals stated in the previous sections. Also,
SHU will be able to determine the amount of risk it is willing to take to offer a comprehensive
and engaging online learning platform. In addition to the risk, there must be appropriate security
measures in place to maintain compliance for faculty and staff using the systems in place.
Policies
The university’s policies protect the integrity of the SHU’s mission, reputation, and
Business
To ensure quality education and culture, the university embraces diversity and inclusion.
The university is committed to the principle of non-discrimination and does not tolerate
discrimination or harassment based on race, color, national origin, sex, handicap, religion,
creed, ancestry, belief, age, veteran status, sexual orientation, or gender identity. (Carnegie
Technology
The university and its IT Administration prohibits unauthorized usage of the systems in
the program particularly accessing any user account, logins, documents, or data without any
authorized permissions.
Cybersecurity
Any information from the systems that is stored, transmitted and authorized for faculty
Procedures
SHU’s procedures are processes to support our given policy objectives within the
university. Also, here are a few procedures that will support your goals within the context of
Business
awareness course otherwise a result in disciplinary action will take place from the university.
Technology
program, any persons from the IT administration within the university may temporarily suspend
Cybersecurity
The university is required by various state and federal regulations to investigate any
incidents that may involve any student’s breach of Personally Identifiable Information (PII).
Standards
The Standards are prescriptive, and its purpose is to document the measures required to
adhere to a given policy. (Moyle, E. and Kelley, D; 2020, November) In this section,
specifications of the SHU’s standards which support the Business, Technology and
Business
The standards here are implemented by a non-discrimination policy from the university.
activities, and all terms and conditions of employment at the University in accordance
with state and federal laws as amended including Title IX, Title VII, Section 504 of the
Rehabilitation Act of 1973. The non-discrimination policy applies to the members of the
University community, including all employees, students, applicants for admissions and
Technology
Students will protect their individual login access to all university systems from any
unauthorized use and should only be able to access personal or public information.
Cybersecurity
○ To identify and mitigate risk to PII, the university will conduct Privacy Impact
Assessment (PIA). These assessments will analyze what data is getting collected, the
purpose of collecting the data, how the data will get used, who will have access to the
data, and how that data will be secured (National Institute of Standards and Technology,
2010)
11
Guidance
The guidance section and its documents represent additional, non-prescriptive and
supplemental information provided from the university, the faculty and or IT stakeholders
Business
Additionally, the university will follow the guidance from all federal and state laws
prohibiting discrimination. The university prohibits any discrimination based on race, national
origin, sex, handicap, age, religion, or marital status against a student or an employee at the
university.
Technology
Under the guidance of the authorized usage of the university’s information systems, users
are prohibited to violate the policies of unauthorized and inappropriate behavior including
Cybersecurity
○ The university will follow ‘NIST Special Publication 800-122 Guide to Protecting the
response to breaches regarding PII (National Institute of Standards and Technology, n.d.).
Risk Appetite
The Risk Appetite Statement summarizes the University’s tolerance for risk in each of
the university goals in business, technology and cybersecurity. Risk appetite is an interaction of
12
the University’s risk appetite, risk profile and capacity to take risks. (Charles Sturt University,
2022)
Business
The University has a low-risk appetite from any behavior from faculty or students that
Technology
The University’s risk appetite is very low tolerance for risks arising from inappropriate or
unauthorized release or use of private data for all faculty and students. (Charles Sturt University,
2022)
Cybersecurity
The university’s stand on information and security risks is currently cautious and low risk
appetite. The university takes these matters ensuring the security and privacy of all faculty and
Compliance requirements
student data, ensures all students get accommodated in pursuing an education, and provides a
learning opportunity where the university can improve its security practices and use technology
to achieve its goals. The university should adhere to the following regulations.
The Americans with Disabilities Act (ADA) holds the university accountable for
ensuring that all students can access content hosted on the LMS and make accommodations for
students with disabilities. The four principles of the Web Content Accessibility Guidelines guide
13
meeting that requirement. Content on the LMS must be perceivable, operable, understandable,
and robust. The content on the LMS must be interpretable to the user's senses and provide an
alternative form of communicating the information to account for disabilities. The features of the
LMS must be able to be understood/ performed by any user and can integrate with assistive
Under the Family Educational Rights and Privacy Act (FERPA), the university needs to
education records. Preventing unauthorized disclosure of PII requires enacting security controls
for user authentication to verify the identity of parties requesting the disclosure of the data (U.S.
Obtaining A SOC 2 Certification is not enforced by Federal regulation and is only valid
for 12 months. Maintaining this certification ensures the university has done its due diligence in
protecting its attack surface and has up-to-date security practices. A SOC 2 compliance audit
scrutinizes how the university security practices abide by the following principles.
● Privacy - How the LMS uses, retains, and disposes of PII. (Imperva, n.d.)
● Security - How the system prevents unauthorized access, theft/removal of data, misuse of
● Availability - Validates the system has the capability to mitigate threats such as
● Processing integrity - Ensures that data entered in the system is valid and authorized.
(Imperva, n.d.)
Summary
information security architecture, will be able to achieve the goals in maintaining a high-quality
education, adapting to an online learning environment for all students, since enrollment at Safe
priorities, risk tolerance and related factors, to help ensure the enterprise architecture reflects
both current and future business needs of the university. (Tierney, 2022, January)
References
Boise State University. (2022, February). System Acceptable Use Standard. OIT Governance, Risk &
category/system-acceptable-use-standard/
15
https://www.cmu.edu/policies/administrative-and-governance/code-business-
ethics-conduct.html
CollegeData & CollegeData. (n.d.). College Sizes: Small, Medium, or Large? CollegeData. Retrieved
https://www.collegedata.com/resources/the-facts-on-fit/college-size-small-
medium-or-large
downtimemonkey.com. (2018, April 25). How much downtime is acceptable for a website.
https://downtimemonkey.com/blog/how-much-downtime-is-acceptable.php
First Coast Technical College. (2022). FCTC.edu. Non-Discrimination Policy. Continuous Notification of
Heriot Watt University. (2019, September). Risk Appetite Statement. Retrieved From
https://www.hw.ac.uk/documents/Risk-appetite-statement.pdf
Indiana University, (2022). Misuse and Abuse of Information Technology Resources. Retrieved From
https://policies.iu.edu/policies/it-02-misuse-abuse-it-resources/index.html
Moyle, Ed and Kelley, Diana. (2020, November). Packt Publishing. Practical Cybersecurity Architecture:
A guide to creating and implementing robust designs for cybersecurity architects. pp 58-69
NIST. (n.d.). Confidentiality - Glossary | CSRC. NIST.Gov. Retrieved May 22, 2022, from
https://csrc.nist.gov/glossary/term/confidentiality#:%7E:text=The%20term
%20’confidentiality’%20mea
s%20preserving,personal%20privacy%20and%20proprietary
%20information.&text=The%20property%
0that%20data%20or,to%20unauthorized%20persons%20or%20processes.
16
NIST. (n.d.). Special Publication 800–122: Guide to Protecting the Confidentiality of Personally
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf
Tierney, Mike (2022, January). Netwrix.com. Blog. What Is Enterprise Information Security
Architecture? Retrieved From https://blog.netwrix.com/2022/01/18/what-is-enterprise-
information-security-architecture/
University of Massachusetts, Lowell. (2022). University of Massachusetts Administrative Standards for
https://www.uml.edu/HR/Equal/Guidelines-Procedures/UMass-Admin-Stand-for-
Nondiscrimination-Harassment.aspx>
University of Nebraska system. (2022). Internal Audit & Advisory Services. Risk Appetite. Retrieved
From https://nebraska.edu/offices-policies/internal-audit-and-advisory-services/
risk-appetite
(ou.edu)
U.S. Department of Education. (n.d.). Protecting Student Privacy. Studentprivacy.Ed.Gov. Retrieved May
What is the CIA Triad? Definition and Examples. (2021, November 10). SecurityScorecard.
https://securityscorecard.com/blog/what-is-the-cia-triad#:%7E:text=Confidentiality%2C
%20Integrity%2C%20and%20Availability.,organization’s%20security%20procedures%20and
%20policies.