Information is Secure
Name | Information is Secure |
Statement | Information is protected based on integrity, availability, confidentiality, incontestability, and authenticity. Every piece of information is submitted to a security assessment based on those five factors. Security traceability includes proper inception and application of the auditing system and monitoring tools. |
Rationale | Open information sharing and disclosure must be balanced with the need to restrict the availability of confidential, proprietary, and sensitive information.
|
Implications |
Note: Learn more about what principles are and how to make them by viewing theĀ TOGAF 9.x standard.