Summary
This chapter provided an overview of key threats, risks, and governance factors that CSAs must consider when designing security architectures and programs. This included the following:
- Threat landscape:
- Architects must have in-depth knowledge of threat actors, their motivations, and TTPs. Staying current on emerging threats through TI is critical.
- Threat modeling using approaches such as STRIDE provides a systematic way to identify vulnerabilities and attack vectors.
- Risk management:
- Risk assessments, both initial and residual, are essential to identify, analyze, and prioritize risks. Special consideration should be given to risks such as data breaches, ransomware, and third-party vendors.
- Risk treatment involves selecting mitigation strategies to reduce unacceptable risks. This may include controls, process changes, or risk transfer.
- Governance:
- Policies, standards, and procedures form the foundation of cybersecurity governance. Compliance with regulations such...