Security Architecture

Security architecture define defesas em camadas (network, application, data, IAM) e a integração de políticas, standards e tecnologias para proteger assets e suportar risk management.

Uma comprehensive security architecture estabelece governance, risk management e engineering practices para proteger information assets através de people, processes e technology. Ela abrange governance e policy, reference models e um technical stack através de múltiplas layers: governance/policy layer; network security; application security; data security; identity and access management; endpoint e cloud security; e supply chain security. Arquiteturas efetivas mapeiam controls para reconhecidos standards (e.g., NIST SP 800-53, ISO/IEC 27001, ISO/IEC 27002, NIST SP 800-160, CSA CCM; SABSA; TOGAF) e integram security no software development lifecycle (secure SDLC) e threat modeling (e.g., STRIDE, PASTA). Elas enfatizam uma risk-based approach, least privilege e defense-in-depth, com clear ownership, measurement e continuous improvement através de monitoring (SIEM, EDR, IAM analytics) e governance reviews. Arquitetura artifacts incluem reference diagrams, policy mappings, control catalogs, data classification schemes e um ongoing program para adaptar a evolving threats e regulatory requirements. Education e awareness, supply chain risk management e incident response integration completam a arquitetura, assegurando alignment com business objectives e regulatory posture.

        graph LR
  Center["Security Architecture"]:::main
  Rel_computer_architecture["computer-architecture"]:::related -.-> Center
  click Rel_computer_architecture "/terms/computer-architecture"
  Rel_security_automation["security-automation"]:::related -.-> Center
  click Rel_security_automation "/terms/security-automation"
  Rel_hardware_security["hardware-security"]:::related -.-> Center
  click Rel_hardware_security "/terms/hardware-security"
  classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
  classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
  classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
  classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
  linkStyle default stroke:#4b5563,stroke-width:2px;

      

🧒 Explique como se eu tivesse 5 anos

Generated ELI5 content

🤓 Expert Deep Dive

Generated expert content

❓ Perguntas frequentes

What is the purpose of a security architecture?

To provide a risk-based blueprint for selecting and implementing security controls that protect critical assets while enabling business operations, governed by policy and continuous improvement.

What frameworks or standards guide security architecture?

Common references include NIST SP 800-53, ISO/IEC 27001/27002, NIST SP 800-160, SABSA, TOGAF, and threat modeling practices (STRIDE, MITRE ATT&CK).

What are typical layers or components?

Governance/policy, network security, application security, data security, identity and access management, endpoint/cloud security, and supply chain security.

How does security architecture relate to risk management?

It translates risk-based requirements into concrete controls, aligns with risk appetite, and enables measurable security outcomes.

What is Zero Trust in this context?

A model that requires verification and least-privilege access for every resource, irrespective of location or network perimeter.

📚 Fontes