Information is Secure

Name

Information is Secure

Statement

Information is protected based on integrity, availability, confidentiality, incontestability, and authenticity. Every piece of information is submitted to a security assessment based on those five factors.

Security traceability includes proper inception and application of the auditing system and monitoring tools.

Rationale

Open information sharing and disclosure must be balanced with the need to restrict the availability of confidential, proprietary, and sensitive information.

  • Current laws and regulations require data privacy and, simultaneously, allow free and unrestricted access. Temporary information (ongoing projects for which disclosure is still not authorized) must be protected to prevent unjustified speculation, misinterpretations, and improper use.
Implications

Note: Learn more about what principles are and how to make them by viewing the TOGAF 9.x standard.