Cyber Security Architecture

Cyber Security architecture refers to the design and structure of an organization's cyber security defenses including its policies, processes, technologies and control. It is a strategic approach that outlines how an organization plan to protect its data, application, devices from cyber threats.




1. Perimeter Security

Perimeter security involves firewall, IPS/IDS and other security devices which protect organization from external threats.

2. Endpoint Security

This involves securing individual devices / endpoints such as laptops, servers, mobiles through antivirus software or host based firewall.

3. IAM

This includes tools and process for managing user identities, authentication and authorization such as multi factor authentication (MFA), single-sign-on (SSO) and role based access control (RBAC).

4. Data Security

This includes / involves protecting sensitive data through encryption, data loss prevention, data classification.

5. Incident Detection 

This includes  security information and event management (SIEM) systems, security analytics and other tools for detecting and responding to security incident in real time.

6. Cloud Security

This involves security cloud-based asset such as cloud servers, storage and application through proper configuration, access control and monitoring.

7. Application Security

This involves secure coding practices, vulnerability assessment and penetration testing to identify and address vulnerabilities in application and software.

8. Security Monitoring and Analytics

This involves continuous monitoring of security events, threat intelligence and security analytics to detect and respond to emerging threats.

9. Security Governance and Risk Management

This includes policies, procedures and framework for managing cybersecurity risk, conducting risk assessments and ensuring compliance with relevant regulation and standards.

10. Employee Awareness and Training

This involves educating employee about cyber security best practices, conducting security awareness training, and promoting a cyber security culture with the organization.

11. Disaster Recovery and Business Continuity

This includes planning and implementing measures to recover from cyber incidents and ensuring business continuity in the event of a cybersecurity breach.

Comments