Summary
In this chapter, we explored the concept of information security architecture, which lays down policies, procedures, and guidelines for creating and deploying an information security architecture within an organization’s enterprise. Key takeaways from this chapter include learning how to integrate information security architecture into the SDLC or SELC, conducting an information security analysis to inform architecture decisions, and the steps to establishing an information security architecture advisement program. The upcoming chapter will dive into cloud computing and its associated information security considerations. You will be introduced to the technologies that underpin cloud systems and the tools and techniques essential for securing them.