ArchiMate_SABSA

YouTube Channel Subscribers Static Badge

GitHub Repo stars GitHub forks GitHub License GitHub language count pages-build-deployment

Practice of Modeling SABSA with the ArchiMate Specification

alignment

Read and Check Detail (Content in the Book)

Resources

Content Mindmap

Get Freeplane and click to open the MindMap (you need to Fork or Clone repository to your local to open it.)

mindmap-l1

You can check markdown format of mindmap if you haven’t installed Freeplane yet.

Brief Introduction

SABSA® (Sherwood Applied Business Security Architecture) is a methodology for developing risk-driven enterprise information security and information assurance architectures and for delivering security infrastructure solutions that support critical business initiatives. It is an open standard, comprising a number of frameworks, models, methods and processes, free for use by all, with no licensing required for end-user organizations who make use of the standard in developing and implementing architectures and solutions. (Source: W100 - SABSA® White Paper)

The Joint Working Group, between SABSA and the Open Group, was established around 2024, aims to following variable purpose:

The practice in this repository is to detail go through the guide, and using Archi (ArchiMate® modeling tool) to create the hands-on model step-by-step, so that it can be tailored by every architecture team to their own company’s EA+Security meta-model creation.

Extended Variable Views on SABSA

SABSA in comparison with other “Security” Framework

  SABSA COBIT NIST
Primary Focus Business-driven security architecture and risk-aligned design Enterprise IT governance, performance, and compliance oversight Cybersecurity risk management, and courity standards
Methodology Layered architecture model driven by business risk context Governance and management objectives, control frameworks, maturity models Risk-based frameworks (CSF, RMF, SP8000 series)
Scope End-to-end enterprise security architecture Organization-wide IT governance and controls Technical and operational cybersecurity
Purpose Design security aligned with business risk Ensure IT value and risk management Establish effective security controls
Use Case Zero-Trust architecture, identity design IT governance audits, compliance Cybersecurity implementation
Integration Insight HOW security is architected WHO governs and WHY controls matter WHAT security controls to implement
Summary Architecture Blueprint HOW Security Controls & Standards

Thanks for sharing the great insight from Rechard Branson.

Other References

Tools Used for Demo and Tutorial

Modeling Tutorial Videos and Repositories

Markdown Editing Tips

Key in special character in Markdown through ALT + code (need to use number pad):

Key in special characters in Markdown through HTML syntax:


Comments are welcome, leave your thoughts in Discussion Board. Last updated at 1/13/2026, 1:05:25 PM