Application Containers & Microservices

Security Overlay Work Instruction HOWTO Presentation 

Mar 11, 2021 06:14:38 AM

The primary goal of the work instruction is to provide guidance and standardize the approach to developing the security control overlay for the architectural patterns found in the ACM MAP (Micro-services Application Pattern) paper. Although the content can aid any number of roles, it is tailored to security architecture, the MAP paper specifically, and the architect’s point of view. The secondary work instruction goal is to create a non-statistical decomposition/re-composition approach to security architecture that remains economical and lightweight without sacrificing the basics of control selection in the design process. The method seeks to avoid the abstract and sometimes esoteric risk conversation that occur in control conversations.

Statistics
0 Favorited
30 Views
2 Files
0 Shares
30 Downloads
Attachment(s)
pdf file
ACM MAP Security Control Overlay Work Instruction final 0....pdf   184 KB   1 version
Uploaded - Mar 11, 2021
pdf file
MAP Work Instruction HOWTO Presentation.pdf   389 KB   1 version
Uploaded - Mar 11, 2021

Tags and Keywords

Comments

Mar 29, 2021 10:14:55 AM

Thanks for the pointers. I did find those and will review and start the S-SDLC Security Overlay section anew as the current information is very misaligned with the instructions. Gustov who was the current author, if you have any objections let me know and if you have any suggestions after reviewing the information provided by Mark.
Thanks

Related Entries and Links

No Related Resource entered.