O'Reilly logo

Software Fortresses: Modeling Enterprise Architectures by Janet Van Sickler, Roger Sessions

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

This chapter has shown that there is quite a bit to creating guards and walls. This is the reason I emphasize making the creation of guards and walls a specialized task within your organization.

Here are the major lessons of this chapter:

  • The walls are primarily responsible for fortification.

  • Three technologies are typically used to build walls:

    1. Firewalls

    2. Database security configuration

    3. Role-based security

  • All data coming into the fortress must be validated. Validation includes

    • Checking for string length violations

    • Checking for unexpected characters

  • Auditing is important if you need to track fortress changes.

  • Authentication is needed to verify that requests are coming from approved sources. Authentication is done with encryption/decryption algorithms ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required