New architecture makes security tricky

It might not be a showstopper, but security is shaping up to be one of the thorniest issues in the federal enterprise architecture hopper.

The issue is not the security of the enterprise architecture models themselves (although that is important), but rather security for the information technology systems that will be built using the federal enterprise architecture as a blueprint. That's because these systems — many based on standard components — potentially will be used by a large number of agencies and might involve unprecedented levels of information and technology exchanges within and among agencies.

"It's immensely difficult," said Tim Hoechst, senior vice president of technology for Oracle Corp.

An enterprise architecture can help because it describes all of the business and transaction flows that need to be secured as well as links among physical assets, he said. But the problem is in coming up with the "architectural consistency" that establishes all of the interrelationships among these so that necessary end-to-end security can be installed throughout the enterprise.

It's not an issue that can be fudged or worked around, according to Valerie Perlowitz, president and chief executive officer of Reliable Integration Services Inc.

"How you protect information going from one agency to another in government is essential for all of this working," she said.

However, with even the basic reference models that will describe the federal enterprise architecture still not defined, security will be an important issue but one that gets addressed later, she said.

About the Author

Brian Robinson is a freelance writer based in Portland, Ore.


  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.