O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Identifying architectural boundaries

As you review this architecture, focus on where natural boundaries exist. These boundaries provide isolation, a potential security opportunity. The boundaries come in many forms, and as described in many places in this book, more layers can provide a greater depth of security. Therefore, every one of these boundaries could be implemented to improve the security of the system. Watch for terms such as the following that identify boundaries within the architecture:

  • Segmentation

  • Perimeter

  • Layering

  • Isolation

  • Encapsulation

  • Black box

  • Data hiding

  • Abstraction

  • Wrapper

  • Time division

  • Namespace

  • Virtual/logical addressing

The goal is to find ways to separate high-value, highly trusted processes and data from lower-value, less-trusted ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required