What is cyber security architecture?

adarsh ds
2 min readOct 31, 2022

--

A cyber security architecture is the foundation of an organization’s defense against cyber threats, and ensures that all components of its IT infrastructure are protected. Environments that are secured by a cyber security architecture include: Cloud. Networks. IoT.

What is the Sabsa framework?

SABSA stands for the Sherwood Applied Business Security Architecture. It provides a framework for developing risk-driven enterprise information security and information assurance architectures. It also aids in delivering security infrastructure solutions that support critical business initiatives.

The SABSA model covers the whole lifecycle of operational capabilities and is made up of six layers.

The SABSA model covers the whole lifecycle of operational capabilities and is made up of six layers. Starting from the top level and going through lower ones, these are: contextual architecture, conceptual architecture, logical architecture, physical architecture, component architecture and service management architecture. The sixth layer, the service management layer, is overlaid on the other five layers.

What are the 7 layers of security?

7 Layers of Security

  • Information Security ….
  • Physical Security. …
  • Secure Networks and Systems. …
  • Vulnerability Programs. …
  • Strong Access Control Measures. …
  • Protect and Backup Data. …
  • Monitor and Test Your Systems….

What are the three security architecture components?

Components of Security Architecture

These components include people, processes, and tools. Each of these components contributes to protecting the organization’s assets.

What is SABSA lifecycle?

SABSA’s four-phase life cycle begins with
Strategy & Planning, and
moves through Design,
Implementation, and
Manage & Measure to iterate through the lifecycle as the organisation evolves
.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

adarsh ds
adarsh ds

Written by adarsh ds

Cyber security trainer at redteam hacker academy , Student Of Sarath G.

No responses yet

Write a response