O'Reilly logo

Principle Based Enterprise Architecture: A Systematic Approach to Enterprise Architecture and Governance by Ian Koenig

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 16 Secure Systems – Golden Rules and Measures

Secure solutions are architected to balance cost and risk in accordance with company strategy. They protect valuable resources from “bad guys” who would attempt to exploit them.

Golden Rule

Severity

1.1

Protect end-user authentication secrets.

1

1.2

Control access to important systems and data.

1

1.3

Keep web traffic private.

1

1.4

Sanitize inputs from untrusted sources before use.

1

1.5

Do not let data become code.

1

1.6

Minimize access to regulated data and protect it when used.

1

1.7

Do not place sensitive data in a URL.

2

1.8

Use third-party software safely.

1

1.9

Catch internet-facing security exposures ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required