This document summarizes a research study that aimed to identify and prioritize important criteria for enterprise information security architecture (EISA) using a fuzzy TOPSIS method. The researchers first reviewed literature on EISA frameworks and extracted major criteria across dimensions like standards, policies, infrastructure, user training, risk assessment, and compliance. They designed a questionnaire to rate the criteria and analyzed the responses from 15 information security experts using fuzzy TOPSIS. The results showed that database/database security, internal software security, electronic data exchange security, and malware monitoring were high priority criteria for effective EISA.