From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Components of a secure environment

Components of a secure environment

- [Instructor] A secure design includes base environmental components that provide a secure foundation for both the application and for any additional controls that you deem necessary. In order to secure your applications, you should also secure the environment in which those apps are both created and executed. We touched on the concept of virtualization in our cloud architecture discussion, and I'd like to go into a little more detail here. Virtualization can be described as running one or more non-physical systems on a single piece of physical hardware. Each of those non-physical or virtual systems is called a guest. It lives entirely on disk and in memory. The physical system that runs those guest systems is called the host. There's a one-to-many relationship between a physical host and its virtual guests. You don't always need to virtualize an entire host system though. You can choose instead to create a container. Containers allow you to virtualize just the application without…

Contents