Reader small image

You're reading from  Cybersecurity Architect's Handbook

Product typeBook
Published inMar 2024
PublisherPackt
ISBN-139781803235844
Edition1st Edition
Right arrow
Author (1)
Lester Nichols
Lester Nichols
author image
Lester Nichols

Lester E. Nichols III currently resides in North Texas and is the Director Security Architecture/VP Cybersecurity Operations at JPMorgan Chase & Co. Previous experience includes the Director of IT Infrastructure and Security for a development company, SOC oversight manager/Senior Infrastructure Officer within DHS and previous experience in Local/Federal/DoD/financial sectors. Lester has post graduate education with a Master's of Science Degree in Information Assurance from Norwich University, the oldest private military school in the United States, and multiple industry certifications including CISSP and SANS certs, as well as others. Lester is also a contributing author to the Computer Security Handbook 5th-6th Editions by Wiley Press.
Read more about Lester Nichols

Right arrow

Architecture Considerations – Design, Development, and Other Security Strategies – Part 1

“Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat.”

– Sun Tzu

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”

– Sun Tzu

“Victorious warriors win first and then go to war, while defeated warriors go to war first and then seek to win.”

– Sun Tzu

“To conquer the enemy without resorting to war is the most desirable. The highest form of generalship is to conquer the enemy by strategy.”

– Sun Tzu

“Weak leadership can wreck the soundest strategy.”

– Sun Tzu

The previous chapter...

Technical design

In the context of security architecture and solution development, technical design is a critical phase where theoretical concepts meet practical implementation. It involves translating requirements into a detailed plan that guides the creation of a system or solution. This section delves into the intricacies of technical design, highlighting its importance in aligning with organizational goals and security requirements.

Fundamentals of technical design

Technical design forms the crucial bridge between strategic cybersecurity plans and their tangible implementation as resilient architectures and solutions. Core focus areas include system architecture, data architecture, interface design, overarching security architecture, and future-ready adaptability.

Robust technical design requires synthesizing business workflows, data classifications, user needs, compliance obligations, and security priorities into comprehensive diagrams and specifications. Proven frameworks...

Life cycle

The architecture life cycle represents a structured framework that guides the design, implementation, and evolution of technology solutions. It provides a vital sequence of stages progressing from initial conceptualization to final deployment and beyond. By methodically following this life cycle, architects can develop tailored solutions that fulfill complex requirements while upholding security. The initial phases focus on gathering comprehensive requirements, drafting high-level models, and creating detailed technical designs. The middle stages encompass solution development, rigorous testing, and validation. The final phases involve secure deployment and ongoing monitoring, maintenance, and enhancement. Each stage necessitates integrating appropriate security controls and compliance measures. Through step-by-step progression across the architecture life cycle, practitioners can craft innovative yet resilient technical realities from conception to implementation. A structured...

Summary

This chapter explored the core disciplines that enable cybersecurity architects to translate organizational needs into tailored technical realities that secure innovation. It emphasized aligning security intrinsically with business objectives early in conceptualization and design. Rigorous development and testing uphold initial visions. Measured deployment delivers functioning systems into production. Sustained maintenance and improvement preserve achievements.

Foundational concepts such as security by design, layered development testing, and maintenance as key enablers of adaptation were covered. Detailed analysis of architecture life cycle stages provided methodical guidance through each phase. Best practices, standards references, and practical labs reinforced techniques for eliciting comprehensive requirements and threats. Methods to systematically transform needs into robust layered designs, develop and validate systems, and then deploy and support solutions provided...

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Cybersecurity Architect's Handbook
Published in: Mar 2024Publisher: PacktISBN-13: 9781803235844
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Lester Nichols

Lester E. Nichols III currently resides in North Texas and is the Director Security Architecture/VP Cybersecurity Operations at JPMorgan Chase & Co. Previous experience includes the Director of IT Infrastructure and Security for a development company, SOC oversight manager/Senior Infrastructure Officer within DHS and previous experience in Local/Federal/DoD/financial sectors. Lester has post graduate education with a Master's of Science Degree in Information Assurance from Norwich University, the oldest private military school in the United States, and multiple industry certifications including CISSP and SANS certs, as well as others. Lester is also a contributing author to the Computer Security Handbook 5th-6th Editions by Wiley Press.
Read more about Lester Nichols