8 CONCLUSION

Over the past decade, we have seen the nature of computing change. Whereas the model was once largely based on technology stacks with varying degrees of integration, today’s hyper-distributed approaches, working practices and personal behaviours require a very different kind of thinking. In security terms, this means moving away from defence-in-depth protection of individual corporate systems, to protecting information assets and services wherever, and however, they are being accessed.

While this more architectural starting point is impacting information security in much the same way as other IT disciplines, the field of IT security architecture is relatively new. As a result, not all organisations may be convinced as to why security ...

Get Security Architect now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.