<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Architecture Reviews in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Security-Architecture-Reviews/m-p/51648#M3554</link>
    <description>&lt;P&gt;You can start with the principle aligned with your organization's objectives. Principles like Single Identity, Security Monitoring, Data Security and etc. You can then assess if the architecture/ design complies with those principles. This will be a continuous process and will get refined over a period of time but you need to start from somewhere and take the feedback for relevant stakeholders and improve.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!!&lt;/P&gt;&lt;P&gt;Rahul Sharma&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jun 2022 06:02:53 GMT</pubDate>
    <dc:creator>rahul28</dc:creator>
    <dc:date>2022-06-21T06:02:53Z</dc:date>
    <item>
      <title>Security Architecture Reviews</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Security-Architecture-Reviews/m-p/47897#M3315</link>
      <description>&lt;P&gt;Hi InfoSec community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anybody suggest how to approach &lt;STRONG&gt;Annual Security Architecture/design review (only Design/Architecture not implementation or VAPT )&lt;/STRONG&gt; of a web application which is not having any proper documentation for Security activities.&lt;/P&gt;&lt;P&gt;When I think about it... it's requires Threat Modeling and Risk Assessment... but it's overwhelming and I would like to get some pointers where to start , what needs to be covered..etc..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Oct 2021 17:26:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Security-Architecture-Reviews/m-p/47897#M3315</guid>
      <dc:creator>iluom</dc:creator>
      <dc:date>2021-10-15T17:26:36Z</dc:date>
    </item>
    <item>
      <title>Re: Security Architecture Reviews</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Security-Architecture-Reviews/m-p/47912#M3320</link>
      <description>Start with an assessment of the application. You will identify threats and weaknesses, Translate that into a roadmap of the target state. You cannot boil the ocean so pick the items that pose the greatest risk as your priority items.</description>
      <pubDate>Sun, 17 Oct 2021 19:25:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Security-Architecture-Reviews/m-p/47912#M3320</guid>
      <dc:creator>BadIdea</dc:creator>
      <dc:date>2021-10-17T19:25:58Z</dc:date>
    </item>
    <item>
      <title>Re: Security Architecture Reviews</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Security-Architecture-Reviews/m-p/47982#M3323</link>
      <description>To me, a quick start in those situations is to get answers about the most common pitfalls I found when working with developers who did not care about Security:&lt;BR /&gt;- Authentication: How it interacts with users and other applications.&lt;BR /&gt;- Credentials: How are stored.&lt;BR /&gt;- Storage: How does it persist changes. What security controls are applied.&lt;BR /&gt;- Data flow.&lt;BR /&gt;I'm talking about quick wins. Of course you are right and a threat modeling and risk assessment are how things should be accomplished, there are so many additional areas to be covered (for example environment, deployment) but sometimes is overwhelming and a simple document can serve as a starter.&lt;BR /&gt;&lt;BR /&gt;Luis. Security Engineer, IT Manager.</description>
      <pubDate>Wed, 20 Oct 2021 07:24:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Security-Architecture-Reviews/m-p/47982#M3323</guid>
      <dc:creator>luisantonio</dc:creator>
      <dc:date>2021-10-20T07:24:15Z</dc:date>
    </item>
    <item>
      <title>Re: Security Architecture Reviews</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Security-Architecture-Reviews/m-p/51648#M3554</link>
      <description>&lt;P&gt;You can start with the principle aligned with your organization's objectives. Principles like Single Identity, Security Monitoring, Data Security and etc. You can then assess if the architecture/ design complies with those principles. This will be a continuous process and will get refined over a period of time but you need to start from somewhere and take the feedback for relevant stakeholders and improve.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!!&lt;/P&gt;&lt;P&gt;Rahul Sharma&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2022 06:02:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Security-Architecture-Reviews/m-p/51648#M3554</guid>
      <dc:creator>rahul28</dc:creator>
      <dc:date>2022-06-21T06:02:53Z</dc:date>
    </item>
  </channel>
</rss>

