ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

Enterprise Architecture Reference Diagram
Enterprise Architecture Reference Diagram
Who it's for:
  • Cybersecurity architects
  • Cloud engineers
  • Cloud security professionals
  • Compliance professionals

Enterprise Architecture Reference Diagram

Release Date: 05/18/2021

The CSA Enterprise Architecture (EA) is both a methodology and a set of tools. It is a framework, a comprehensive approach for the architecture of a secure cloud infrastructure and can be used to assess opportunities for improvement, create roadmaps for technology adoption, identify reusable security patterns, and assess various cloud providers and security technology vendors against a common set of capabilities.

To create the CSA Enterprise Architecture, the EA Working Group leveraged four industry standard architecture models: TOGAF, ITIL, SABSA, and Jericho, therefore combining the best of breed architecture paradigms into a comprehensive approach to cloud security. By merging business drivers with security infrastructure, the EA increases the value proposition of cloud services within an enterprise business model. The CSA Enterprise Architecture was adopted by the National Institute of Standards and Technologies in NIST SP 500-299 and NIST SP 500-292.

This diagram provides a broad overview and visual representation of the Enterprise Architecture. It is intended as your quick reference guide. For a full explanation of each domain and its components, refer to the Enterprise Architecture v2 Reference Guide. 

To learn how the EA maps to CSA’s standard controls set, refer to the Enterprise Architecture v2 to CCM v3.01 Mapping.

Key Takeaways:
  • A visualization of CSA’s Enterprise Architecture
  • The key components of a secure, identity-aware cloud infrastructure
Download this Resource

Bookmark
Share
Related resources
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Zero Trust Guidance for IoT
Zero Trust Guidance for IoT
SASE: Securing the New Enterprise Perimeter with Zero Trust
SASE: Securing the New Enterprise Perimeter with Zero Trust
Published: 10/27/2025
What Is Model Context Protocol (MCP)?
What Is Model Context Protocol (MCP)?
Published: 10/15/2025
From Automation to Augmentation: The Future of SOCs in Enterprise Cybersecurity
From Automation to Augmentation: The Future of SOCs in Enterprise C...
Published: 10/09/2025
Achieving Resilience Through Zero Trust
Achieving Resilience Through Zero Trust
Published: 08/29/2025

Interested in helping develop research with CSA?

Related Certificates & Training