search menu icon-carat-right cmu-wordmark

Governing for Enterprise Security (GES) Implementation Guide

Technical Note
In this 2007 report, the authors provide prescriptive guidance for creating and sustaining an enterprise security governance program.
Publisher

Software Engineering Institute

CMU/SEI Report Number
CMU/SEI-2007-TN-020
DOI (Digital Object Identifier)
10.1184/R1/6574010.v1
Subjects

Abstract

Governing for enterprise security means viewing adequate security as a non-negotiable requirement of being in business. If an organization's management does not establish and reinforce the business need for effective enterprise security, the organization's desired state of security will not be articulated, achieved, or sustained. To achieve a sustainable capability, organizations must make enterprise security the responsibility of leaders at a governance level, not of other organizational roles that lack the authority, accountability, and resources to act and enforce compliance. 

This implementation guide builds upon prior publications by providing prescriptive guidance for creating and sustaining an enterprise security governance program. It is geared for senior leaders, including those who serve on boards of directors or the equivalent. Throughout the implementation guide, we describe the elements of an enterprise security program (ESP) and suggest how leaders can oversee, direct, and control it, and thereby exercise appropriate governance. 

Elevating security to a governance-level concern fosters attentive, security-conscious leaders who are better positioned to protect an organization's digital assets, operations, market position, and reputation. This document presents a roadmap and practical guidance that will help business leaders implement an effective security governance program.

Cite This Technical Note

Allen, J., & Westby, J. (2007, August 1). Governing for Enterprise Security (GES) Implementation Guide. (Technical Note CMU/SEI-2007-TN-020). Retrieved April 16, 2024, from https://doi.org/10.1184/R1/6574010.v1.

@techreport{allen_2007,
author={Allen, Julia and Westby, Jody},
title={Governing for Enterprise Security (GES) Implementation Guide},
month={Aug},
year={2007},
number={CMU/SEI-2007-TN-020},
howpublished={Carnegie Mellon University, Software Engineering Institute's Digital Library},
url={https://doi.org/10.1184/R1/6574010.v1},
note={Accessed: 2024-Apr-16}
}

Allen, Julia, and Jody Westby. "Governing for Enterprise Security (GES) Implementation Guide." (CMU/SEI-2007-TN-020). Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, August 1, 2007. https://doi.org/10.1184/R1/6574010.v1.

J. Allen, and J. Westby, "Governing for Enterprise Security (GES) Implementation Guide," Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, Technical Note CMU/SEI-2007-TN-020, 1-Aug-2007 [Online]. Available: https://doi.org/10.1184/R1/6574010.v1. [Accessed: 16-Apr-2024].

Allen, Julia, and Jody Westby. "Governing for Enterprise Security (GES) Implementation Guide." (Technical Note CMU/SEI-2007-TN-020). Carnegie Mellon University, Software Engineering Institute's Digital Library, Software Engineering Institute, 1 Aug. 2007. https://doi.org/10.1184/R1/6574010.v1. Accessed 16 Apr. 2024.

Allen, Julia; & Westby, Jody. Governing for Enterprise Security (GES) Implementation Guide. CMU/SEI-2007-TN-020. Software Engineering Institute. 2007. https://doi.org/10.1184/R1/6574010.v1