E-Book, Englisch, 250 Seiten
Schoenfield Insider's Guide to Cyber Security Architecture
1. Auflage 2016
ISBN: 978-1-4987-4200-9
Verlag: CRC Press
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
E-Book, Englisch, 250 Seiten
ISBN: 978-1-4987-4200-9
Verlag: CRC Press
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
This book is filled with techniques, tips, and tricks that secure software architects and developers can apply directly. From assessing the sensitivity of data in a system through actually getting requirements implemented, this book offers readers practical, how-to advice in small, focused and directly applicable gems of insight, knowledge, and wisdom from secure software principal architect Brook S.E. Schoenfield. The book is organized by applicability of topics that include getting security architecture started, helping architects be effective, working with partner teams, assessing systems, driving security requirements to completion, and programmatic hints.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Introduction. What Is This Thing Called "Security Architecture"?. What Is Security Assessment. Architecture Risk Assessment. Threat Modeling. ATASM. Background knowledge: The Three S’s. Architecture. Threats. Attack Surfaces. Mitigations. Requirements. Security Architecture Programs. Secure Development Lifecycle. Tips and Tricks. Relationships Are (Almost) Everything. Know the Policies and Standards. Start With Context. Work Holistically. Assessment is Fractal and Recursive. Don’t Get Sidetracked By Presenting Problems. The Early Requirement Gets the Worm. Break the Kill Chain to Mitigate. Probability Can Be Reduced To Booleans. Becoming Part of a Team. We Are Not Cops. Playing a Long Game. Conflict Builds Trust. Give Risks to Decision Makers. Making Friends with Exceptions. Interjections and Release Scheduling. What to Do When Brought in Late. Transparency!. Post Threat Models. The Rule of the Most Sensitive. External to Internal? Build a mini-DMZ. Peer Review Rules. When Policies Make Sense, When They Don’t. Working with Eyeball-to-Eyeball Security. Measuring Success. Measuring Architect Performance.