The Open Group Library

Security Guides

Set Ascending Direction

1-10 of 23

Page:
  1. 1
  2. 2
  3. 3
  1. Axioms for the Practice of Security Architecture

    This document provides 20 axioms for the practice of Security Architecture.
    Learn More
  2. Integrating Risk and Security within a TOGAF® Enterprise Architecture

    This document is The Open Group Guide addressing how to integrate considerations of security and risk into an Enterprise Architecture.
    Learn More
  3. Open FAIR™ Risk Analysis Process Guide

    This Guide offers some best practices for performing an Open FAIR™ risk analysis: it aims to help risk analysts understand how to apply the Open FAIR risk analysis methodology.
    Learn More
  4. Open FAIR™ Tool with SIPmath™ Distributions: Guide to the Theory of Operation

    This document defines the algorithms that can be used to produce an acceptable implementation of the Open FAIR™ Risk Analysis (O-RA) standard, a standard of The Open Group.
    Learn More
  5. The Open FAIR™ – NIST Cybersecurity Framework Cookbook

    This document describes in detail how to apply the Open FAIR factor analysis for information risk methodology to the NIST Framework for Improving Critical Infrastructure Cybersecurity (NIST Cybersecurity Framework).
    Learn More
  6. Implementation Guide to Leveraging Open Trusted Technology Providers in the Supply Chain

    Guidelines for Implementers of the NIST Cybersecurity Framework (CSF)
    Learn More
  7. Optimizing ISO/IEC 27001:2013 using O-ISM3

    This Guide is aimed at users of the well-established ISO/IEC 27001 Information Security Management Standard, to explain how The Open Group O-ISM3 Standard (C102) complements and extends ISO/IEC 27001 by adding further security management controls and applying security performance metrics.
    Learn More
  8. Trust Ecosystem Guide

    A guide to operating in a trust ecosystem.
    Learn More
  9. Jericho Forum® Identity Commandments: Key Concepts

    This Guide builds on these five videos to explain in more depth but also in similar plain language why a trusted identity ecosystem is so important to everyone.
    Learn More
  10. Framework for Secure Collaboration-Oriented Architectures (O-SCOA)

    This Open Group Framework for Secure Collaboration-Oriented Architectures (O-SCOA) specifies the requirements for secure design of enterprise IT architectures that support deperimeterized operations.

    Learn More

Set Ascending Direction

1-10 of 23

Page:
  1. 1
  2. 2
  3. 3