Book Image

Practical Cybersecurity Architecture

By : Ed Moyle, Diana Kelley
Book Image

Practical Cybersecurity Architecture

By: Ed Moyle, Diana Kelley

Overview of this book

Cybersecurity architects work with others to develop a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through ongoing monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others.
Table of Contents (14 chapters)
Section 1:Security Architecture
Section 2: Building an Architecture
Section 3:Execution

Chapter 6: Building an Architecture – Application Blueprints

In the previous chapter, we discussed the process of creating a high-level design document for a segment of the enterprise architecture. As you may recall, we employed several steps, many of which are elements of the architecture definition document described in the TOGAF architecture development method (ADM). While none of the actions we took were necessarily specific to TOGAF, we did employ their concepts and process in a way that we hope will allow you to glean existing information, should you need it from those resources.

In this chapter, we'll go through the same process but using a slightly different method for applications rather than the enterprise scope. Specifically, we'll go into the details of creating a baseline, high-level design framework for applications. You'll probably find the specific steps of this process analogous to the exercises we went through in the previous chapter. However...