The top-level components of the IBM Security Blueprint are shown in Figure 2.
Figure 2 The IBM Security Blueprint
The Foundational Security Management services describe the top-level services that need to be implemented in order to achieve the required functionality addressed in the IBM Security Framework. These represent the layers where the business requirements, as defined in the IBM Security Framework, are converted to top-level IT services to fulfill these requirements. At this point, the threshold has been crossed from pure business related viewpoints to actual IT systems.
The more common Security Services and Infrastructure layer contains infrastructure elements and services that are used by the top level services in the Foundational Security Management services. These services represent control points in the IT environment.