Security Architecture
Definitions
- Security Architecture
- those parts of an architecture related to fulfilling the
security requirements
The typical responsibilities of a Security Architecture are to:
- Ensure that the architecture fulfills the security requirements.
- Identify all major components that are primarily related to implementing the security requirements.
- Identify all security mechanisms.
The typical contents of a security architecture are:
- Security Components (including but not limited
to):
- Identification and Authentication Subsystems.
- Firewalls.
- Intrusion Detection Subsystems.
- Encryption/Decryption Subsystems.
- Antivirus Programs.
- Mechanisms for Fulfilling the Security
Requirements:
The typical stakeholders of a Security Architecture are:
- Producers:
- Evaluators:
- Approvers:
- Maintainers:
-
Security Team
- Users:
A security architecture typically is produced during the
following phases:
Preconditions
A security architecture typically can be started if the
following preconditions hold:
The typical inputs to a security architecture include:
- Work Products:
- Stakeholders:
A security architecture is typically constrained by the
following conventions:
-
Work Flow
-
Content and Format Standard
-
Inspection Checklist
- Example Security Components:
- Identification and Authentication Subsystems.
- Firewalls.
- Intrusion Detection Subsystems.
- Encryption/Decryption Subsystems.
- Antivirus Programs.
- Example Security Mechanisms:
- User Identifiers (Identification)
- Passwords (Authentication)
- Biometric Devices (Identification and
Authentication)
- Digital Signatures (Identification and
Authentication)
- Encryption/Decryption (Privacy for messages and
data)
- Hash (integrity)