Defence in Depth
Shepherding Solution Architecture
Security Decisions
AGENDA
1. Description of Defence in Depth
2. Defence in Depth within the Enterprise
2.1. From the solution architect perspective
3. Issues toward implementation
4. Getting to finished
http://technet.microsoft.com/en-us/library/cc512681.aspx
2 Perspectives
CORP
Perimeter
DMZ1
api
api
CORP
Data GovernancePerimeter
Security & Privacy
Standards &
Compliance
Content Access &
Management
DMZ1
Business
Continuity & DRP
IDZ
people.healthcare.com partners.healthcare.com doctors.healthcare.com
NetworkPractices
DirectoryPractices
DatabasePractices
SDLCPractices
api
Perimeter
DMZ1
api
api
vendors.com
Shepherding the Decision
1. Concise problem statement
2. Identifying the technical stakeholders
3. Approvers and reviewers
4. Comprehensive set of options
5. Iterate
6. Make a recommendation
7. Related systems and issues
8. Future considerations
Some examples
● Identity system
● Online publishing
● Directory location
● Network segmentation
● Data location
● Search
● Being mindful of legacies
Peter Rawsthorne, B.Tech, M Ed IT
peter@rawsthorne.org
@prawsthorne
http://www.linkedin.com/in/prawsthorne
QUESTIONS?

Defence in Depth Architectural Decisions