Security Architecture
Security architecture define defesas em camadas (network, application, data, IAM) e a integração de políticas, standards e tecnologias para proteger assets e suportar risk management.
Uma comprehensive security architecture estabelece governance, risk management e engineering practices para proteger information assets através de people, processes e technology. Ela abrange governance e policy, reference models e um technical stack através de múltiplas layers: governance/policy layer; network security; application security; data security; identity and access management; endpoint e cloud security; e supply chain security. Arquiteturas efetivas mapeiam controls para reconhecidos standards (e.g., NIST SP 800-53, ISO/IEC 27001, ISO/IEC 27002, NIST SP 800-160, CSA CCM; SABSA; TOGAF) e integram security no software development lifecycle (secure SDLC) e threat modeling (e.g., STRIDE, PASTA). Elas enfatizam uma risk-based approach, least privilege e defense-in-depth, com clear ownership, measurement e continuous improvement através de monitoring (SIEM, EDR, IAM analytics) e governance reviews. Arquitetura artifacts incluem reference diagrams, policy mappings, control catalogs, data classification schemes e um ongoing program para adaptar a evolving threats e regulatory requirements. Education e awareness, supply chain risk management e incident response integration completam a arquitetura, assegurando alignment com business objectives e regulatory posture.
graph LR
Center["Security Architecture"]:::main
Rel_computer_architecture["computer-architecture"]:::related -.-> Center
click Rel_computer_architecture "/terms/computer-architecture"
Rel_security_automation["security-automation"]:::related -.-> Center
click Rel_security_automation "/terms/security-automation"
Rel_hardware_security["hardware-security"]:::related -.-> Center
click Rel_hardware_security "/terms/hardware-security"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 Explique como se eu tivesse 5 anos
Generated ELI5 content
🤓 Expert Deep Dive
Generated expert content
❓ Perguntas frequentes
What is the purpose of a security architecture?
To provide a risk-based blueprint for selecting and implementing security controls that protect critical assets while enabling business operations, governed by policy and continuous improvement.
What frameworks or standards guide security architecture?
Common references include NIST SP 800-53, ISO/IEC 27001/27002, NIST SP 800-160, SABSA, TOGAF, and threat modeling practices (STRIDE, MITRE ATT&CK).
What are typical layers or components?
Governance/policy, network security, application security, data security, identity and access management, endpoint/cloud security, and supply chain security.
How does security architecture relate to risk management?
It translates risk-based requirements into concrete controls, aligns with risk appetite, and enables measurable security outcomes.
What is Zero Trust in this context?
A model that requires verification and least-privilege access for every resource, irrespective of location or network perimeter.