It is the experience of many corporate organizations that information security solutions are often designed, acquired and installed on a tactical basis. A requirement is identified, a specification is developed and a solution is sought to meet that situation. In this process there is no opportunity to consider the strategic dimension, and the result is that the organization builds up a mixture of technical solutions on an ad-hoc basis, each independently designed and specified and with no guarantee that they will be compatible and interoperable. Worse still, there is no analysis of the long-term costs, especially the operational costs, and there is no strategy that can be identifiably said to support the goals of the business. It does not have to be this way. The solution lies in the development of an enterprise security architecture which is business-driven and which describes a structured inter-relationship between the technical and procedural solutions to support the long-term needs of the business of the organization. If the architecture is to work, then it must provide a rational framework within which decisions can be made upon the selection of security solutions, derived from a thorough understanding of the business requirements, including the need for cost reduction, modularity, scaleability, reusability, operability, usability, interoperability both internally and externally, and integration with the enterprise IT architecture and its legacy systems. This paper describes a model for such an architecture (known as SALSA) which has been developed by the author and which is currently being implemented successfully in a number of major corporate clients. Its primary characteristic is that everything must be derived from an analysis of the business requirements for security, especially those in which security has an enabling function through which new business opportunities can be developed and exploited. The model is layered, with the top layer being the business requirements definition stage. At each lower layer a new level of abstraction is developed, going through the definition of major security strategies, security services, security mechanisms and finally at the lowest layer, the selection of technologies and products — in other words the shopping list. The model itself is generic and can be the starting point for any organization, but by going through the process of analysis and decision-making implied by its structure, it becomes specific to the enterprise, and is finally highly customized to a unique business model. It becomes in reality the enterprise security architecture, and it is central to the success of a strategic programme of information security management within the organization.