Book Image

Practical Cybersecurity Architecture

By : Ed Moyle, Diana Kelley
Book Image

Practical Cybersecurity Architecture

By: Ed Moyle, Diana Kelley

Overview of this book

Cybersecurity architects work with others to develop a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through ongoing monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others.
Table of Contents (14 chapters)
1
Section 1:Security Architecture
4
Section 2: Building an Architecture
9
Section 3:Execution

Section 2: Building an Architecture

This section walks through how to begin the solution design process: specifically, how to map out the high-level and conceptual design for subsequent implementation. Before we can get to the nitty gritty of how we will accomplish a given design, we need to first answer the questions of why one design is better than another. This, as you might imagine, is unique to the business within which the solution will live.

These chapters begin a learn by doing approach that will continue throughout the rest of the book. Beginning with scope and requirements, we unpack how to evaluate the boundaries of our design scope: what needs are to be met, for what areas of the business, and under what constraints. After establishing these key factors that serve as raw materials to ensure business needs are met, we then put together a toolbox of the techniques that we will employ as we build the design and marshal the resources that will help get us there...