Book description
Plan, design, and build resilient security architectures to secure your organization's hybrid networks, cloud-based workflows, services, and applications
Key Features
- Understand the role of the architect in successfully creating complex security structures
- Learn methodologies for creating architecture documentation, engaging stakeholders, and implementing designs
- Understand how to refine and improve architecture methodologies to meet business challenges
- Purchase of the print or Kindle book includes a free PDF eBook
Book Description
Cybersecurity architecture is the discipline of systematically ensuring that an organization is resilient against cybersecurity threats. Cybersecurity architects work in tandem with stakeholders to create a vision for security in the organization and create designs that are implementable, goal-based, and aligned with the organization’s governance strategy.
Within this book, you'll learn the fundamentals of cybersecurity architecture as a practical discipline. These fundamentals are evergreen approaches that, once mastered, can be applied and adapted to new and emerging technologies like artificial intelligence and machine learning. You’ll learn how to address and mitigate risks, design secure solutions in a purposeful and repeatable way, communicate with others about security designs, and bring designs to fruition. This new edition outlines strategies to help you work with execution teams to make your vision a reality, along with ways of keeping designs relevant over time. As you progress, you'll also learn about well-known frameworks for building robust designs and strategies that you can adopt to create your own designs.
By the end of this book, you’ll have the foundational skills required to build infrastructure, cloud, AI, and application solutions for today and well into the future with robust security components for your organization.
What you will learn
- Create your own architectures and analyze different models
- Understand strategies for creating architectures for environments and applications
- Discover approaches to documentation using repeatable approaches and tools
- Discover different communication techniques for designs, goals, and requirements
- Focus on implementation strategies for designs that help reduce risk
- Apply architectural discipline to your organization using best practices
Who this book is for
This book is for new as well as seasoned cybersecurity architects looking to explore and polish their cybersecurity architecture skills. Additionally, anyone involved in the process of implementing, planning, operating, or maintaining cybersecurity in an organization can benefit from this book. If you are a security practitioner, systems auditor, and (to a lesser extent) software developer invested in keeping your organization secure, this book will act as a reference guide.
Table of contents
- Practical Cybersecurity Architecture
- Contributors
- About the authors
- About the reviewer
- Preface
- Part 1: Security Architecture
-
Chapter 1: What Is Cybersecurity Architecture?
- Understanding the need for cybersecurity
-
What is cybersecurity architecture?
- Network versus application security architecture
- The role of the architect
- Secure network architectures
- Secure application architectures
- Case study – the value of architecture
- Architecture, security standards, and frameworks
- Architecture frameworks
- Security guidance and standards
- Security architecture frameworks
- Architecture roles and processes
- Summary
- Chapter 2: Architecture – The Core of Solution Building
- Part 2: Building an Architecture
- Chapter 3: Building an Architecture – Scope and Requirements
-
Chapter 4: Building an Architecture – Your Toolbox
- Introduction to the architect’s toolbox
- Planning tools
- Case study – data gathering
-
Building blocks of secure design
- Information security policies
- Organization of information security
- Human resources security
- Asset management
- Access control
- Cryptography
- Physical and environmental security
- Operations security
- Communications security
- System acquisition, development, and maintenance
- Supplier relationships
- Information security incident management
- Information security aspects of business continuity management
- Compliance
- Summary
- Chapter 5: Building an Architecture – Developing Enterprise Blueprints
- Chapter 6: Building an Architecture – Application Blueprints
- Part 3: Execution
-
Chapter 7: Execution –Applying Architecture Models
- Process steps
-
Technical design
- What specific provider do we use to do this?
- Do we need additional infrastructure (VPN, access points, etc.)?
- What client software do users require (if any)?
- Creating technical implementation strategies
- Assess constraints, synergies, and areas of opportunity
- Validating against likely threat paths and creating a skeleton solution document
- Validating implementation strategies
- Finalizing the documentation
- Operational integration
- Telemetry
- Summary
- Chapter 8: Execution – Future-Proofing
- Chapter 9: Putting It All Together
- Index
- Other Books You May Enjoy
Product information
- Title: Practical Cybersecurity Architecture - Second Edition
- Author(s):
- Release date: November 2023
- Publisher(s): Packt Publishing
- ISBN: 9781837637164
You might also like
book
Practical Cybersecurity Architecture
Plan and design robust security architectures to secure your organization's technology landscape and the applications you …
book
Practical Cloud Security, 2nd Edition
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. …
book
Cybersecurity Architect's Handbook
Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise …
book
Security in Computing, 6th Edition
The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to …