Book Image

Practical Cybersecurity Architecture

By : Ed Moyle, Diana Kelley
Book Image

Practical Cybersecurity Architecture

By: Ed Moyle, Diana Kelley

Overview of this book

Cybersecurity architects work with others to develop a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through ongoing monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others.
Table of Contents (14 chapters)
1
Section 1:Security Architecture
4
Section 2: Building an Architecture
9
Section 3:Execution

Planning tools

"Every company can benefit from architecture work. For a large enterprise certainly, but even for a small business there's value. For a small or mid-size business, the organization may wish to think through timelines and documentation requirements as, in a small organization, there may be fewer stakeholders to meet with, allowing you to accomplish a lot in a relatively short period of time. Also, while a larger organization might require more documentation of architectural efforts, a smaller organization might be able to make do with less. The process itself though can provide value no matter the size of the organization."

– Dr. Char Sample, chief research scientist at the cybercore division at Idaho National Laboratory

From a planning point of view, there are a number of tools that we can employ to help guide us toward a security design. Some are useful right from the get-go; others are useful later on as we get into the execution piece of...