Security Architecture

Security Architecture

Enterprise Security architecture must relate appropriately to the corporate risk management, corporate IT governance, enterprise architecture, and physical security programs of the enterprise. At AllCyberOne we follow a top-down approach—start by looking at the business goals, objectives and vision.

We will work with our customers to:

  • Identify business objectives, goals and strategy
  • Identify business attributes that are required to achieve those goals
  • Identify all the risk associated with the attributes that can prevent a business from achieving its goals.
  • Identify the required controls to manage the risk
  • Define a program to design and implement those controls:
    • Define conceptual architecture (Information architecture, Certificate management architecture, Access control architecture, Application security architecture, Web services architecture, Communication security architecture)
    • Define physical architecture and map with conceptual architecture (Hardware, Network, Operating system, File and Database security, practices and procedures)
    • Define component architecture and map with physical architecture (Security standards (e.g., US National Institute of Standards and Technology [NIST], ISO), Security products and tools (e.g., antivirus [AV], virtual private network [VPN], firewall, wireless security, vulnerability scanner), Web services security (e.g., HTTP/HTTPS protocol, application program interface [API], web application firewall [WAF])
    • Define operational architecture (Implementation guides, Administrations, Configuration/patch management, Monitoring, Logging)

Get in touch with us

If you have an enquiry you want to discuss with us, fill in the form below and one of our experienced advisers will be in touch