-
Book Overview & Buying
-
Table Of Contents
Cybersecurity Architect's Handbook
By :
“We cannot enter into alliances until we are acquainted with the designs of our neighbors.”
– Sun Tzu
In the previous chapter, we covered areas of architecture principles, design, and analysis that will be part of the day-to-day function of a cybersecurity architect (CSA). The chapter discussed these areas and equipped you to establish a solid contextual basis. The remaining parts build on this by progressing through requirements, logical design, physical design, and implementation planning. The goal is to provide an end-to-end methodology while explaining the rationale behind each step so that you can adapt approaches as a CSA.
With an understanding of the principles, design, and analysis related to architecture, the next step is applying that understanding as regards threats, risks, and governance. As an architect, it is important not to provide designs or implement technologies without an understanding...