From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Secure operational architecture
From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Secure operational architecture
- [Instructor] Your architectural design considerations should focus on what a secure application will look like once it goes into production. Two operational considerations you'll want to address are deployment topology and operational interfaces. While designing a secure application, you should always look beyond the code itself; you should consider the deployment topology as well. Your efforts to secure the application won't do much good if the attacker can compromise the app via a weakness in the application infrastructure. Network segmentation is one way to bolster the security of your deployment topology. Once you understand the data flow of your application from input to processing to storage and backups, you can limit access to certain infrastructure components using firewalls that restrict that traffic. Encrypted communications are a logical next step; some might even argue it should be top priority. Again, review that data flow and identify areas where data in motion might…
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Components of a secure environment8m 25s
-
(Locked)
Designing network and server controls4m 22s
-
(Locked)
Designing data controls6m 25s
-
(Locked)
Secure design principles and patterns5m 6s
-
(Locked)
Secure interface design6m 49s
-
(Locked)
Security architecture and design review3m 6s
-
(Locked)
Secure operational architecture3m 37s
-
(Locked)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-