Knowledge Base

Security Architecture – Part 1

What we want to focus on is the information security architecture. Various platforms, web sites, and a wide variety of articles and security research are shared. Some speaks of new software, some user awareness, and some certificates. According to the list, there are 104 personal security certificates. When we say security infrastructures, applications, corporate certifications, it is not easy to imagine how complex the structure is.
At this point, many people are talking about security architecture, because the security architecture should be drawn. So, how will this architecture? Will the devices end with applications vs. processes? Is it drawn correctly? How’s that gonna make it live? Which source will be taken as a reference?
we will not mention specific technologies, applications and methods individually in our future articles. Everyone has a right way for themselves, and all of them are quite right. However, we would like to try to address a few things about what the architecture should be and what its purpose is.
First and foremost, I think the most important is the services. What is this service?
Although there are various definitions in different sources, they are the outputs of the processes. The customer takes care of things like software security, quality, performance rather than how you write the software. For security, then we need to focus on service security architecture by taking the service. What we call information is offered to the customer/user by the service. The point is that we should create a service architecture. What is this service architecture? Architectural teams refer to standards such as TOGAF, Zachman. Process experts refer to standards such as ISO 27001, COBIT, ITIL. But for this, how many people do the institution think to create its own special good practice? How many people in your institution know the definition of the word ca Security ”? Or how many of you have defined the “Security” definition specific to your sand?
We have to start from here.
Read more in our next article.