Securing Systems: Applied Security Architecture and Threat Models
- 9h 12m
- Brook S.E. Schoenfield
- CRC Press
- 2015
- Illustrates the overall security picture of system architectures
- Walks readers through the threat modeling process
- Explains the basics of the security assessment: the architecture and data flow diagrams
- Includes real-world sample architectures to help readers develop and hone assessment skills
- Describes the craft of building a reliable risk rating and Just Good Enough Risk Rating (JGERR)
- Includes a compendium of common attacks and controls
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect’s job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system’s existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.
Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis:
- When should the security architect begin the analysis?
- At what points can a security architect add the most value?
- What are the activities the architect must execute?
- How are these activities delivered?
- What is the set of knowledge domains applied to the analysis?
- What are the outputs?
- What are the tips and tricks that make security architecture risk assessment easier?
To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you’ve seen a sufficient diversity of architectures, you’ll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.
About the Author
Brook S.E. Schoenfield is Director of Product Security Architecture at Intel Security Group. He is the senior technical leader for software security across the division’s broad product portfolio. He has held leadership security architecture positions at high-tech companies for many years. Brook has presented at conferences such as RSA, BSIMM, and SANS What Works Summits on subjects within security architecture, including architecture risk assessment and threat models, information security risk, SaaS/Cloud security, and Agile security. He has been published by CRC Press, SANS, Cisco, and the IEEE.
In this Book
-
Introduction
-
The Art of Security Assessment
-
Security Architecture of Systems
-
Information Security Risk
-
Prepare for Assessment
-
Summary
-
eCommerce Website
-
Enterprise Architecture
-
Business Analytics
-
Endpoint Anti-malware
-
Mobile Security Software with Cloud Management
-
Cloud Software as a Service (SaaS)
-
Summary
-
Patterns and Governance Deliver Economies of Scale
-
Building an Assessment Program
-
Summary and Afterword