ABSTRACT

We have now examined the six distinct architectures for security using the ATASM process. In each analysis, the recurring patterns of attack surfaces and security solutions have been highlighted. After reading this chapter, it should be clear that similar situations arise in seemingly disparate architectures. Indeed, whether building an online retail store, an internal business analytics system, the administration interface for enterprise security software, or a cloud reputation service, the security basics around administration and management make up one of the solutions that is required to build a defense-in-depth.