Chapter 5

Providing a Secure Architecture

Hacking and the deployment of an appropriate security architecture are at the forefront of every company’s attention. As many companies are experiencing their systems being hacked, security architectures can be put in place to minimize the severity of such attacks. The process begins with attempting to think like a hacker. This approach helps companies find vulnerabilities that they were not aware of and may not even have been able to envision.

Providing a Secure Architecture

There are four primary topics of secure architectures:

1.  Isolation and least privilege

2.  Access control concepts

3.  Operating systems isolation

4.  Browser isolation and least privilege

Within these topics, there are three main ...

Get Network and Data Security for Non-Engineers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.