O'Reilly logo

Principle Based Enterprise Architecture: A Systematic Approach to Enterprise Architecture and Governance by Ian Koenig

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

APPENDIX 3 Golden Rules for Systems Quick Reference

1

Secure Systems (Safe Solutions)

Severity

1.1

Protect end-user authentication secrets.

1

1.2

Control access to important systems and data.

1

1.3

Keep web traffic private.

1

1.4

Sanitize inputs from untrusted sources before use.

1

1.5

Do not let data become code.

1

1.6

Minimize access to regulated data and protect it when used.

1

1.7

Do not place sensitive data in a URL.

2

1.8

Use third-party software safely.

1

1.9

Catch internet-facing security exposures before they are exploited.

1

1.10

Record and report on important security related events.

1

1.11

Use standard authentication implementations. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required