Sat Aug 30 13:02:35 PDT 2014
Technical Security Architecture: How are technical controls structured?
The description is up to them.
Technical controls are used in some manner to accomplish some set of goals and within some framework.
A structured approach to technical controls following the
technical security architecture of the enterprise protection approach
used in this assessment should be applied:
Technical control structure
Copyright(c) Fred Cohen, 1988-2012 - All Rights Reserved
Technical Security Architecture
|In Motion|| Protective Mechanisms|
obscurity - profile - appearance - deception - depiction - cognition |
tracking - change - timeframe - fail-safe - fault tolerance - human - separation of duties - least privilege - intrusion/anomaly detection and response|
control and data flows - digital diodes - firewalls and bypasses - barriers - mandatory / discretionary access controls - zoning |
transforms - filters - markings - syntax - situation - presentation |
|Content and its business utility|