control architecture [English]


Syndetic Relationships

InterPARES Definition

n. ~ A conceptual framework and structural approach that describes overarching security objectives, and typically includes protection objectives.

General Notes

A control architecture provides a high-level overview with few or no details regarding implementation. It may address access control, functional units, perimeters, access mechanisms, a trust model, and change controls (Cohen, 2008, 11).

Citations

  • Cohen 2008 (†652 p. 11): The control architecture includes structural mechanisms that obtain security objectives through access control models, functional units, perimeters, mechanisms using identification, authentication, and authorization to facilitate use, change control, and other non-architectural mechanisms for specific situations. (†1479)
  • Cohen 2008 (†652 p. 21-22): Control architecture may be the most complex thing to understand about enterprise information protection because it is so ephemeral and yet so critical. Control architecture goes directly to how the enterprise thinks about and acts on information protection issues. . . . The control architecture is typically comprised of protection objectives, an access control model, functional units, perimeters, access mechanisms, a trust model, and change controls. (†1480)
  • Cohen 2008 (†652 p. 23): The control architecture is not the implementation of things that carry out these controls. Rather it is a model of what the controls are, how they work, and how they interact to assure the utility of content. (†1481)
  • Cohen 2008 (†652 p. 173): The control architecture creates the overarching objectives and structural approaches to protection without drilling down into the details of how those objectives are met or those approaches are implemented. It is a theoretical structure that ultimately gets implemented by the technical security architecture. (†1482)
  • Hurley 2015 (†642 p.5): The control architecture includes structural mechanisms that obtain security objectives through access control, functional units, ... change control, and lower surety non-architectural units. (†1445)
  • Liang, et al. 2008 (†658 p.3642): Control architecture, which not only has robust control to rapidly handle customer requests for order modification and resolve conflicting issues, but also is flexible enough to meet different kinds of demands by selecting adequate resources, is absolutely necessary throughout the total life cycle of VE [Virtual Enterprise]. (†1502)