Hands-On Cybersecurity for Architects: Plan and design robust security architectures by Neil Rerup & Milad Aslaner
Author:Neil Rerup & Milad Aslaner [Rerup, Neil]
Language: eng
Format: epub
Tags: COM011000 - COMPUTERS / Systems Architecture / General, COM053000 - COMPUTERS / Security / General, COM025000 - COMPUTERS / Expert Systems
Publisher: Packt Publishing
Published: 2018-07-29T23:00:00+00:00
Build phase
Different organizations have different definitions and views of the security architect. Some view the security architect as a role that is all about tracking risk through a project, regardless of which phase the project is in. Some organizations view the security architect as the person that will design a solution, and then provide oversight of the implementation of the solution. And some organizations view the security architect as the role that will design as well as build the solution.
There are pros and cons for each role definition. The skill level that is associated with the tracking of risk through a project probably isn't nearly as high as the role that needs to actually design something. It's easier to criticize something than it is to design and build something. Often, organizations will have Security Analysts performing the Risk Impact Assessments (RIAs) on projects for each phase, whereas they will have security architects in place to deal with actual design needs.
Having the security architect design and build a solution can ensure that the design is understood by the person that is implementing it. After all, if the security architect doesn't understand their own design, they are going to be in trouble. But there's a separation of duties that you want to maintain, even in the building of a solution—not to mention that the operations groups typically don't like someone not of their own group actually putting hands on their equipment.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(22432)
Hello! Python by Anthony Briggs(21622)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(20183)
Dependency Injection in .NET by Mark Seemann(19563)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(19311)
Kotlin in Action by Dmitry Jemerov(19233)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(18774)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(17576)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16965)
Grails in Action by Glen Smith Peter Ledbrook(16726)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(14219)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(12199)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(10923)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10597)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(10029)
Hit Refresh by Satya Nadella(9115)
The Kubernetes Operator Framework Book by Michael Dame(8537)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8362)
Robo-Advisor with Python by Aki Ranin(8305)