Chapter 6: Building an Architecture – Application Blueprints
In the previous chapter, we discussed the process of creating a high-level design document for a segment of the enterprise architecture. As you may recall, we employed several steps, many of which are elements of the architecture definition document described in the TOGAF architecture development method (ADM). While none of the actions we took were necessarily specific to TOGAF, we did employ their concepts and process in a way that we hope will allow you to glean existing information, should you need it from those resources.
In this chapter, we'll go through the same process but using a slightly different method for applications rather than the enterprise scope. Specifically, we'll ...
Get Practical Cybersecurity Architecture now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.