A Practical Approach to ESA Implementation at Small and Medium Enterprises

Bright abstract design with dynamic lines and colorful dots creating an energetic visual effect.
Author: Mike Brass and Robert Campbell
Date Published: 1 May 2025
Read Time: 16 minutes
Related: COBIT for Small and Medium Enterprises Using COBIT 2019 | Digital | English

Small and medium enterprises (SMEs) face unique challenges when implementing robust security measures. Unlike large enterprises, SMEs usually operate with limited budgets, fewer resources, and smaller teams. However, they are equally vulnerable to cyberthreats. Improving the security of products and services, as well as internal processes, is a great enabler and differentiator for SMEs, but it requires that they understand their business structure and integrate security from a business-oriented perspective. All organizations have an enterprise architecture (EA), whether it is defined and properly constructed or not, and it is possible to implement an enterprise security architecture (ESA) within the EA by taking a step-by- step approach emphasizing practical strategies.

Understanding EAs and ESAs

Enterprise architecture frameworks such as The Open Group Architecture Framework (TOGAF)1 define the structure and operation of an enterprise. There is a debate whether TOGAF is an EA framework or a subset of a true business architecture framework.2 The purpose of an EA is to ensure that the structure of the enterprise aligns with business goals and that processes, systems, and technologies are integrated effectively. In other words, it recognizes that all areas of the business are interconnected, and nothing should be overlooked. For SMEs, formally defining an EA offers a practical roadmap for growth, enabling them to scale operations, adopt new technologies, and respond effectively to market changes.

An ESA such as the Sherwood Applied Business Security Architecture (SABSA) framework3 is a critical EA subset focusing on security concerns across the enterprise. An ESA integrates security principles into the EA framework, addressing risk factors and vulnerabilities while supporting the overall business strategy. Unlike traditional, isolated approaches to cybersecurity, an ESA embeds security considerations into every layer of the EA: business, application, data, and technology. This ensures that security measures are not only reactive but also proactive, supporting both current and future organizational needs.

An ESA also plays a pivotal role in bridging the gap between operational demands and security requirements. SMEs often operate with limited resources and cannot afford the financial or reputational costs of security breaches. However, they can create a unified approach to managing security risk by leveraging their existing EA structure to optimize resources, enhance resilience, and adapt SABSA or an equivalent framework. For example, an SME in the retail sector could use its ESA to ensure the security of customer payment data while maintaining the seamless operation of its online and physical store.

One of the key benefits of integrating an ESA into the EA is the alignment of security measures with business objectives. This alignment enables SMEs to prioritize security investments based on their most critical assets and processes. For example, a manufacturing SME might focus on protecting intellectual property and ensuring the reliability of the technology used on production lines. An ESA also helps SMEs navigate the complex regulatory landscape, as it can be tailored to address compliance requirements such as the EU General Data Protection Regulation (GDPR),4 US Health Insurance Portability and Accountability Act (HIPAA),5 or Payment Card Industry Data Security Standard (PCI DSS).6 In this way, the ESA serves as both a protective mechanism and a strategic enabler, helping SMEs achieve their business goals while mitigating risk.

Governance provides the structure and oversight needed to ensure that security initiatives are prioritized, monitored, and continually improved.

In addition, an ESA facilitates communication and collaboration between technical and nontechnical stakeholders. By framing security within the broader context of the EA, an ESA helps demystify cybersecurity concepts, making them accessible to decision makers across the enterprise. This holistic approach fosters a security-aware culture where all employees, from executives to front-line staff, understand their role in protecting the enterprise. For SMEs, this cultural shift is particularly valuable, as human error is a leading cause of security incidents.

Establishing a Governance Framework

A governance process is essential for aligning an ESA with the EA. Governance provides the structure and oversight needed to ensure that security initiatives are prioritized, monitored, and continually improved. It can be challenging for SMEs to maintain an efficient process, for reasons related to time to market and/or running operations such as pre-sales, sales, software development, and hardware development in-house. However, it is a critical step toward achieving a cohesive and effective security posture.

Governance begins with the clear definition of roles and responsibilities. In SMEs, where dedicated security teams may not exist, these roles can be assigned to existing staff or external consultants, provided they have the necessary capabilities or can be appropriately trained. These roles should be well documented and include accountability for implementing, monitoring, and updating both EA and ESA components. Another vital aspect of governance is fostering a culture of accountability and security awareness. Leadership plays a key role by demonstrating a commitment to security and encouraging employees at all levels to take ownership of their responsibilities.

Committees or cross-functional teams can enhance governance by bringing together diverse perspectives. These teams can include representatives from IT, operations, finance, and other departments to review architecture decisions and security measures. For instance, a governance committee might meet quarterly to assess the effectiveness of current security practices, review incident reports, and propose improvements.

Finally, governance frameworks should include mechanisms for continual improvement. SMEs operate in dynamic environments where threats and business priorities can change rapidly. Governance structures must be adaptable, allowing for the regular review and updating of policies, roles, and metrics. Engaging external auditors or consultants to conduct periodic assessments can provide valuable insights and ensure that governance remains effective over time.

Aligning the ESA With Business Objectives

The alignment and integration of the ESA with business objectives must reflect the SME's strategic goals. This begins with a comprehensive understanding of key business processes and their interdependence on digital technologies that directly impact their ability to deliver value to customers and stakeholders. Collaboration between technical and nontechnical stakeholders is crucial for successful alignment. Security professionals must work closely with business leaders to understand strategic objectives and translate them into actionable security measures. Alignment ensures that security measures are implemented not as standalone initiatives but as integral components of the business strategy.

SMEs should conduct a thorough analysis of their business processes, identifying areas where security threats could disrupt operations. Security goals should be specific, measurable, and aligned with overall business objectives. For example, an SME in the healthcare sector may prioritize safeguarding patient data to comply with applicable regulations and maintain patient trust. Similarly, an ecommerce SME might focus on securing payment systems to prevent fraud and protect customer information.

Limited resources often force SMEs to make strategic choices about where to allocate their security budgets.

Once critical areas are identified, SMEs should evaluate their risk tolerance levels. Risk tolerance must be assessed to determine the acceptable level of exposure for different business activities and processes, which varies by industry, size, and organizational priorities. For instance, a financial services SME may adopt a zero-tolerance policy for data breaches due to stringent regulatory requirements, while a small creative agency might focus on protecting intellectual property and client data with slightly less stringent measures.

Alignment also involves prioritizing security investments based on business impact. Limited resources often force SMEs to make strategic choices about where to allocate their security budgets. Alignment helps ensure that resources are directed toward high-priority areas. These objectives inform contractual terms with suppliers as well as requirements for project delivery services within the enterprise. This requires continuous monitoring and adaptation. Business priorities and the threat landscape are constantly evolving, and security measures must keep pace. An SME expanding into cloud-based operations might need to adjust its ESA to address new risk factors associated with cloud environments. Retaining and improving this alignment can foster trust and confidence among stakeholders.

Leveraging a Security Framework Within the ESA

An ESA is about the “what”—namely, the question of what can be done to integrate security into the overarching business architecture or structure.

Using a bespoke framework or an industry standard (e.g., the National Cyber Security Centre’s Cyber Assessment Framework,7 the US National Institute of Standards and Technology [NIST] Cybersecurity Framework,8 or International Organization for Standardization [ISO] 27001)9 serves as the “how,” helping to minimize problems, costs, and penalties for noncompliance. A security framework acts as a blueprint for defining, implementing, and managing security controls within an enterprise. Implementing a recognized security framework is a critical step to ensure consistent practices, regulatory compliance, and efficient resource utilization. Guidance such as ISO 27001, the NIST Cybersecurity Framework, and COBIT®10 provides structured guidelines that can be tailored to the specific needs and constraints of SMEs.

Implementing a framework involves conducting a comprehensive risk assessment to identify vulnerabilities and prioritize actions. For example, an SME in the retail sector might use a risk assessment to identify weaknesses in its payment processing systems. Based on the findings, the enterprise can define controls to mitigate these vulnerabilities, such as deploying encryption technologies and instituting multifactor authentication (MFA) for employees.

Frameworks also emphasize continuous monitoring and improvement. SMEs should establish mechanisms to track the effectiveness of security controls, such as regular vulnerability scans, penetration testing, and compliance audits. Metrics derived from these activities can be used to measure progress, identify areas for improvement, and demonstrate accountability to stakeholders. For example, a small manufacturing firm adopting ISO 27001 could use audit results to showcase its commitment to protecting intellectual property and customer data, gaining a competitive edge in the marketplace.

Another critical aspect of adopting a security framework is employee involvement. Frameworks provide guidance for defining roles and responsibilities and instituting training programs to ensure that all employees contribute to the enterprise’s security objectives. SMEs can conduct regular workshops and awareness campaigns to educate staff about phishing attacks, data handling practices, and incident reporting procedures.

Integrating Security Through the Use of Layers

Security should be built in layers to ensure a comprehensive and resilient approach to organizational security. An EA typically comprises multiple layers: business, application, data, and technology. Each layer has distinct functions and requirements, and embedding security measures into these layers creates a cohesive and proactive defense strategy. For SMEs, this integration ensures that security is treated not as an afterthought but as an inherent part of the enterprise’s operational framework.

Business Layer
At the business layer, security integration involves safeguarding critical processes and workflows. SMEs can achieve this by developing clear security policies and procedures that align with business objectives. An SME in the healthcare industry may implement stringent access controls for patient records and establish protocols for incident response to ensure compliance with regulations such as HIPAA. Automating business processes, such as invoice approvals or supply chain management, can also enhance security by reducing human error and improving operational efficiency.

Application Layer
The application layer focuses on the security of software and systems used within the enterprise. SMEs should adopt secure software development practices such as conducting regular code reviews, implementing secure coding standards, and performing vulnerability testing before deploying applications. An ecommerce SME might incorporate application security testing tools to identify and address vulnerabilities in its online storefront. Additionally, web application firewalls can help protect against common threats, such as SQL injection and cross-site scripting (XSS).

Data Layer
At the data layer, the emphasis is on protecting sensitive and mission-critical information. SMEs should classify data based on its sensitivity and importance, applying appropriate controls to each category. Encryption is a vital measure for securing data both in transit and at rest. A financial SME can use end-to-end encryption for customer transactions to safeguard against interception by malicious actors. Access control mechanisms, such as role-based access control, ensure that only authorized personnel can access specific datasets, reducing the risk of data breaches.

Technology Layer
The technology layer involves securing the underlying infrastructure via hardware, networks, and endpoints. SMEs can harden their infrastructure by applying security patches, configuring firewalls, and implementing intrusion detection and prevention systems. For instance, a manufacturing SME might deploy network segmentation to isolate its operational technology systems from its IT networks, minimizing the potential impact of cyberattacks. Endpoint protection solutions, such as antivirus software and endpoint detection and response tools, are also crucial for securing devices used by employees.

Security should be built in layers to ensure a comprehensive and resilient approach to organizational security.

Furthermore, conducting regular audits and penetration tests can identify and address vulnerabilities, ensuring that security measures remain effective over time. These security measures must be practical, scalable, and aligned with the enterprise’s unique requirements to create a robust defense strategy that protects critical assets, supports compliance efforts, and fosters organizational resilience.

Ensuring Regulatory Compliance

Many SMEs operate in regulated industries, making compliance a critical aspect of the ESA. Regulations such as the GDPR, HIPAA, and PCI DSS often mandate specific security measures to protect sensitive data. SMEs should begin by mapping compliance requirements to their business processes, identifying gaps, and implementing the necessary controls. A retail SME handling credit card transactions must adhere to PCI DSS, including encryption of payment data and regular vulnerability scans. Regular audits and employee training programs help ensure ongoing compliance, reducing the risk of penalties and reputational damage.

Building a Security-Aware Culture

Security is not just a technical challenge; it is also a cultural one. SMEs must invest in fostering a security-aware culture among employees at all levels. Regular training programs can educate staff on phishing, password management, and incident reporting. Phishing simulations can help employees recognize and respond to suspicious emails. Awareness campaigns, such as those conducted through newsletters and workshops, reinforce best practices and highlight the importance of security. Leadership engagement is equally important, as executives who advocate for security initiatives set a positive example and encourage organizational buy- in. A security-aware culture strengthens an SME’s overall defense, reducing the likelihood of human error leading to breaches.

Establishing Incident Response Plans

Despite preventive measures, security incidents may occur. A robust incident response plan ensures swift recovery and minimal impact on operations. The plan should include an incident response team with clearly defined roles, such as incident managers and technical leads. Detailed playbooks should provide step-by-step guidance for handling various scenarios, such as ransomware attacks or data breaches. An SME experiencing a ransomware attack might use a playbook outlining immediate containment steps, communication protocols, and data recovery procedures. Regular testing of backup systems and recovery processes ensures that critical data can be restored quickly, minimizing downtime and financial losses.

Continuous Measurement and Improvement

Key performance indicators (KPIs), such as mean time to detect and mean time to respond, provide insights into the effectiveness of ESA implementation. SMEs should conduct periodic reviews to update the ESA, addressing emerging threats and changes in business operations. Engaging third-party experts to perform assessments offers an unbiased perspective that can identify blind spots and areas for improvement. Continuous improvement ensures that the ESA remains aligned with organizational objectives and adapts to the evolving threat landscape.

Addressing Challenges and Solutions

SMEs face unique challenges in implementing an ESA, including limited resources, complexity, and resistance to change. A small healthcare provider may lack the budget for advanced security tools or a dedicated IT team. Solutions include prioritizing high-impact, low-cost measures such as MFA and regular software updates, which provide significant protection with minimal investment. Managed security services offer expertise and scalability, allowing SMEs to access advanced capabilities without hiring additional staff. Simplifying frameworks and involving employees early in the process can mitigate resistance, leading to smoother adoption of security measures.

Two Fictional Case Studies

A retail SME was experiencing frequent phishing attacks and struggled with PCI DSS compliance. By adopting the NIST Cybersecurity Framework tailored to retail, implementing MFA, training staff to recognize phishing attempts, and partnering with a managed security service provider, the enterprise reduced phishing incidents by 70% and achieved PCI DSS compliance within six months.

Security is not just a technical challenge; it is also a cultural one.

Similarly, a tech startup needed to secure intellectual property while developing software products and preparing for ISO 27001 certification. It adapted SABSA by developing policies and standardized sets of repeatable activities and deployed appropriate human security resources for each project. The startup enhanced its security posture and achieved certification, boosting customer trust.

These examples demonstrate how tailored ESA strategies can address specific challenges faced by SMEs, leading to tangible benefits.

Getting Started

ESA implementation is an ongoing process that requires regular evaluation and improvement. To kick off this journey, enterprises should:

  1. Start small and scale up.
    • Principle—Begin by identifying the most critical assets (e.g., key customer data, payment information, essential operational systems) and focus on protecting these first.
    • Action—Implement basic security controls (e.g., strong passwords, MFA, regular software updates) before moving on to more complex measures.
  2. Align security with business goals.
    • Principle—Ensure that any security investment directly supports what matters most to the enterprise, whether that is maintaining customer trust, complying with regulations, or ensuring operational continuity.
    • Action—Map security priorities to business objectives (e.g., prevent payment fraud to maintain customer loyalty) and direct limited resources toward the areas of highest impact.
  3. Leverage recognized frameworks, but keep it simple.
    • Principle—Use established security frameworks (e.g., the UK’s National Cyber Security Centre guidance or Cyber Assessment Framework) as starting points rather than trying to reinvent the wheel.
    • Action—Adopt a minimal set of recommended controls or checklists from these frameworks, adjusting them to fit the enterprise’s size and needs.
  4. Integrate security into everyday operations.
    • Principle—Treat security as an element of how to do business, not as a separate project.
    • Action—Incorporate security checks into routine tasks—backing up data, running updates, reviewing supplier security—so they become second nature.
  5. Clearly define roles and responsibilities.
    • Principle—Even if there is no dedicated security team, assign responsibility for security tasks to specific individuals, ensuring accountability and consistency.
    • Action—Identify one or two people to oversee essential security matters and use external consultants as needed for periodic reviews or specialist support.
  6. Communicate and educate.
    • Principle—Engage all employees in security awareness, ensuring that everyone understands how their actions affect the enterprise’s safety.
    • Action—Run short training sessions, share simple security tips, and encourage staff to promptly report suspicious emails or incidents.
  7. Monitor, measure, and improve over time.
    • Principle—Security is not a one-time effort. Regularly review what is and is not working to identify where improvements can be made.
    • Action—Use simple metrics—such as how quickly the enterprise responds to suspicious activity or how often it updates key systems—and revisit these measures quarterly to track progress and make adjustments.
  8. Use external help wisely.
    • Principle—Where resources are limited, consider managed security services or external experts for specific tasks (e.g., annual security assessments or compliance checks).
    • Action—Outsource select functions rather than hiring full-time staff, ensuring specialist insight without straining resources.

Conclusion

Implementing an ESA is crucial for SMEs to effectively manage security risk and align security measures with business objectives. SMEs can create a proactive and resilient defense strategy that supports their growth and operational efficiency by integrating security into every layer of the enterprise architecture. Leveraging recognized security frameworks, establishing a governance process, and fostering a security-aware culture are essential steps in this journey. SMEs can achieve significant benefits by prioritizing high-impact, low-cost security measures and continuously improving their security posture. Ultimately, an ESA not only protects SMEs from cyberthreats, but also enables them to build trust with customers, comply with regulations, and achieve their strategic goals.

Endnotes

1 The Open Group, The TOGAF Standard, 10th edition
2 Rouse, A.; Design to Win, ClassiQ Ltd, 2023
3 SABSA, “SABSA Executive Summary
4 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation [GDPR])
5 US Department of Health and Human Services, “Summary of the HIPAA Privacy Rule,” USA
6 PCI Security Standards Council, PCI DSS: v4.0.1
7 National Cyber Security Centre, Cyber Assessment Framework, United Kingdom
8 National Institute of Standards and Technology (NIST), The NIST Cybersecurity Framework (CSF) 2.0, 26 February 2024
9 International Organization for Standardization, ISO 27001:2022—Information security, cybersecurity and privacy protection: information security management systems, 2022
10 ISACA®, COBIT® 2019 Framework: Introduction and Methodology, USA, 2019

MIKE BRASS

Is head of enterprise security architecture (ESA) at National Highways (UK).

ROBERT CAMPBELL

Is an enterprise security architect at National Highways.