Threat, Risk, and Governance Considerations as an Architect
In the previous chapter, we covered areas of architecture principles, design, and analysis that will be part of the day-to-day function of a cybersecurity architect (CSA). The chapter discussed these areas and equipped you to establish a solid contextual basis. The remaining parts build on this by progressing through requirements, logical design, physical design, and implementation planning. The goal is to provide an end-to-end methodology while explaining the rationale behind each step so that you can adapt approaches as a CSA.
With an understanding of the principles, design, and analysis related to architecture, the next step is applying that understanding as regards threats, risks, and governance. As an architect, it is important not to provide designs or implement technologies without an understanding...