We recently updated this diagram and wanted to share a little bit about the changes and the document itself to help you better utilize it.
Cyber security reference architecture.
This reference architecture is created to improve security and privacy designs in general.
Our community of professionals is committed to lifetime learning career progression and sharing expertise for the benefit of individuals and organizations around the globe.
Performance bene ts and vulnerability mitigation by leveraging network segmentation to reinforce defense in depth practices the cyber se.
Security reference architectures come in many flavors including industry based technology based and enterprise specific.
5 star 23 downloaded 68 859 times.
The awarding winning cyber reference architecture is composed of an enterprise architecture framework that describes security with a common taxonomy and nomenclature and aligns with known security standards and approaches such as togaf sabsa cobit nist and iso.
Nist special publication 500 299.
Microsoft cybersecurity reference architecture mcra pptx.
The cybersecurity solution design may take the form of prevention and or remediation of a particular.
Security reference architecture 7.
Nist cloud computing.
Nist cloud computing 6.
This reference architecture is not just another security book.
This architecture consists of 12 domains that cover the entire security program.
In our opinion it is time to stop reinventing the wheel when it comes down to creating architectures and designs for security and privacy solutions.
This document provides an overview of the jie development process and cyber security reference architecture cs ra security framework.
The microsoft cybersecurity reference architecture https aka ms mcra describes microsoft s cybersecurity capabilities and how they integrate with existing security architectures and capabilities.
Secure architecture joint information environment nsa is the security advisor for the development of the joint information environment jie cyber security architecture.
When looking for some directional guidance when designing a cybersecurity solution a cybersecurity professional can leverage the security reference architecture.