Line 21: |
Line 21: |
| <!-- NAV end --> | | <!-- NAV end --> |
| | | |
− | {{Translation to follow}} | + | <i>{{Translation to follow}}</i> |
| + | <br> |
| + | <!-- Columns --> |
| + | {| width="100%" cellpadding="10" |
| + | |- valign="top" |
| | | |
| + | | width="50%" style="color: blue;" | |
| + | |
| + | <!-- COLUMN 1 STARTS: --> |
| + | <span style="font-size: 1.5em;"><b><<Application Architecture</b></span> |
| + | <!-- COLUMN 1 ENDS: --> |
| + | |
| + | | width="50%" style="color: blue;" | |
| + | |
| + | <!-- COLUMN 2 STARTS: --> |
| + | <span style="font-size: 1.5em;"><b>Enterprise Architecture Standard main page>></b></span> |
| + | <!-- COLUMN 2 ENDS: --> |
| + | |
| + | |} |
| + | <br> |
| + | |
| + | =5. Security & Privacy Architecture= |
| + | <br> |
| This is a definition for GC Security and Privacy Enterprise Architecture | | This is a definition for GC Security and Privacy Enterprise Architecture |
| | | |
− | <b>Design for Security and Privacy</b>
| + | ==Design for Security and Privacy== |
| * Implement security across all architectural layers | | * Implement security across all architectural layers |
| * Categorize data properly to determine appropriate safeguards | | * Categorize data properly to determine appropriate safeguards |
| * Perform a privacy impact assessment (PIA) when personal information is involved | | * Perform a privacy impact assessment (PIA) when personal information is involved |
| * Balance user and business needs with proportionate security measures | | * Balance user and business needs with proportionate security measures |