Book Image

Practical Cybersecurity Architecture

By : Ed Moyle, Diana Kelley
Book Image

Practical Cybersecurity Architecture

By: Ed Moyle, Diana Kelley

Overview of this book

Cybersecurity architects work with others to develop a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through ongoing monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others.
Table of Contents (14 chapters)
Section 1:Security Architecture
Section 2: Building an Architecture
Section 3:Execution

Chapter 2: The Core of Solution Building

In the first chapter of this book, we went through what a cybersecurity architect is, what they do (that is, the functions they perform), and the value they – and the architecture process itself – can provide to an organization. In this chapter, we will build on that to begin the process of describing how to develop an architecture.

Over the course of this chapter, we will explore the structures that organizations set up to ensure key outcomes are achieved. It is important for the architect to understand these elements because the whole point of architecture is to support the organizational mission – to do that, we have to understand what that mission is and the strategies that the organization has put in place to achieve it. This will be the backdrop to all the work we do.

We'll walk through how organizations derive their goals (including security goals), and strategies they will use to ensure those goals are...