From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Secure operational architecture

Secure operational architecture

- [Instructor] Your architectural design considerations should focus on what a secure application will look like once it goes into production. Two operational considerations you'll want to address are deployment topology and operational interfaces. While designing a secure application, you should always look beyond the code itself; you should consider the deployment topology as well. Your efforts to secure the application won't do much good if the attacker can compromise the app via a weakness in the application infrastructure. Network segmentation is one way to bolster the security of your deployment topology. Once you understand the data flow of your application from input to processing to storage and backups, you can limit access to certain infrastructure components using firewalls that restrict that traffic. Encrypted communications are a logical next step; some might even argue it should be top priority. Again, review that data flow and identify areas where data in motion might…

Contents