Intelligence-based DevSecOps high-level architecture
A logical analysis of threat vectors, controls, and surfaces must be conducted and communicated when designing a secure application. Software applications can become complex with time or business needs. And the more complex the application, the more techniques, tools, and resources are required to secure it. Therefore, a CTI analyst should have a blueprint of the security architecture – to understand how the application components fit together. They must also understand its context. Most security architectures concentrate on defense against cyberattacks – security hardening. The designer configures and integrates control methods that neutralize cyber threats. Security hardening gives more control to the system – once the deployment and configurations are completed, the application is expected to detect, stop, quarantine, or delete threats. However, security hardening is not enough for system and application protection...