5

Threat, Risk, and Governance Considerations as an Architect

“We cannot enter into alliances until we are acquainted with the designs of our neighbors.”

– Sun Tzu

In the previous chapter, we covered areas of architecture principles, design, and analysis that will be part of the day-to-day function of a cybersecurity architect (CSA). The chapter discussed these areas and equipped you to establish a solid contextual basis. The remaining parts build on this by progressing through requirements, logical design, physical design, and implementation planning. The goal is to provide an end-to-end methodology while explaining the rationale behind each step so that you can adapt approaches as a CSA.

With an understanding of the principles, design, and ...

Get Cybersecurity Architect's Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.