当前位置:网站首页>Design your security architecture OKR
Design your security architecture OKR
2022-07-06 20:21:00 【InfoQ】
0x00 Preface
0x01 Security architecture goals
Object
- Service oriented security capabilities
- Security service platform
- Intelligent security platform
Key Resources
- Focus on values and threats from a strategic perspective , Carry out the construction of standards and specifications
- Focus on service and delivery from a technical perspective , Carry out basic capacity-building
- Focus on scenarios and quality from an operational perspective , Do a good job in life cycle management ( closed loop )
0x02 Architecture and platform
- Every governance area needs strategies , technology , Operation support
- Every governance area needs architectural guidance , Platform delivery , Operational services
- Basic security determines the lower limit of application security and data security
- Architecture design determines the upper limit of security platform and security operation
- Cryptography: HSM, KMS, PKI, Crypto Agility, Encryption as service, Transparent encryption, cert management, etc.
- Data Protection: DLP, EDR, Email Protection, Data Classification/Tagging/Privacy Platform, 3rd file sharing, etc.
- Identity Access & Management: IDP, MFA, Hardware Key, Passwordless, Beyond Corp / Dev, etc.
0x03 summary
边栏推荐
- Appx代码签名指南
- Crawler (14) - scrape redis distributed crawler (1) | detailed explanation
- Leetcode question 448 Find all missing numbers in the array
- Qinglong panel white screen one key repair
- 【计网】第三章 数据链路层(4)局域网、以太网、无线局域网、VLAN
- 逻辑是个好东西
- Anaconda安装后Jupyter launch 没反应&网页打开运行没执行
- Trends of "software" in robotics Engineering
- 【每周一坑】输出三角形
- rt-thread i2c 使用教程
猜你喜欢
“罚点球”小游戏
5. 无线体内纳米网:十大“可行吗?”问题
Enumeration gets values based on parameters
5. Wireless in vivo nano network: top ten "feasible?" problem
Case ① | host security construction: best practice of 3 levels and 11 capabilities
【GET-4】
OceanBase社区版之OBD方式部署方式单机安装
Boder radius has four values, and boder radius exceeds four values
Tencent Android development interview, basic knowledge of Android Development
案例 ①|主机安全建设:3个层级,11大能力的最佳实践
随机推荐
How does kubernetes support stateful applications through statefulset? (07)
【每周一坑】正整数分解质因数 +【解答】计算100以内质数之和
Problems encountered in using RT thread component fish
Poj3617 best cow line
What happened to the kernel after malloc() was transferred? Attached malloc () and free () implementation source
8086指令码汇总表(表格)
Extraction rules and test objectives of performance test points
Tencent cloud database public cloud market ranks top 2!
HMS Core 机器学习服务打造同传翻译新“声”态,AI让国际交流更顺畅
Guangzhou's first data security summit will open in Baiyun District
[network planning] Chapter 3 data link layer (3) channel division medium access control
02 basic introduction - data package expansion
Web security - payload
Error analysis ~csdn rebound shell error
Rhcsa Road
Poj1149 pigs [maximum flow]
Appx代码签名指南
PowerPivot——DAX(初识)
技术分享 | 抓包分析 TCP 协议
永磁同步电机转子位置估算专题 —— 基波模型与转子位置角