Git Product home page Git Product logo

securityarchitecture's Introduction

Open Security Reference Architecture

IT Security is a complex field. People, processes and technology are crucial parts of an architecture to reduce risks. Our certified experts love to solve your cyber security challenges. Detecting what is not good with your current security is the simple work. You can find many companies that launch automated test suites based on open source tools that tell you that you are not secure enough. However the real challenge is designing solutions that are secure.

Open publications for cyber security are still rare. Despite the great work of the OWASP foundation many valuable resources for Security are not open.

This reference architecture aims to enable you to create better and faster security solutions. You SHOULD use and reuse content that is provided in this reference architecture to prevent reinventing the wheel.

To encourage collaboration for this project this reference architecture is of course free and open (cc-by-sa).

This project is supported by the BM-Support Foundation, https://www.bm-support.org/

Current status: We are working on a update for the 2023 hardcopy version of this publication. We will focus on security only for this update, so 'Open Reference Architecture for Security'. But the online version will always be up-to-date! So join the party and join the team to make this Open resource better!

The initial version (2015) of this project was called the 'Open Reference Architecture for Security and Privacy'.However we decided to split the project in a security Playbook and a privacy playbook. Content for this Security Reference Architecture is partly derived from the original 2015-2021 publication, but heavily edited and improved.

Contributing

We encourage all security professionals to improve this reference architecture. Join the team to:

  • Add open (cc-by) security resources.
  • Add security models.
  • Create better graphics and text.
  • Add threat models that can be easily reused.
  • Improve criteria on selecting OSS solutions for security.
  • Create open tools to speed up the process of making your security architectures or designs with use of this reference architecture.

Your contributions to this Guide are greatly appreciated as long as contributions fit within the scope and goal of this security reference architecture. As an open project, this Security Architecture shall always remain vendor-neutral and freely available for all to use. If you contribute you will of course get credit (mentioned in upcoming publications).

  • This reference architecture is intended to be a helpful resource aimed at professional security architects and engineers.
  • Contributions must fit within the scope and goal of this security reference architecture.
  • All contributions to resources must be open. E.g. cc-by licensed)

For small corrections or input, just send me an email. For larger contributions, please create a pull request.

Licensing

When you submit text to which you hold the copyright, you agree to license it under:

  • Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0).

securityarchitecture's People

Contributors

adulau avatar asimjahan avatar diebauer avatar nocomplexity avatar presidentelect avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

securityarchitecture's Issues

Issue on page /prevention/simplesolutions.html

Dead link at Respond Section:

Respond

:class: tip, dropdown
Do not reinvent the wheel. For every simple or complex security incident a good procedure is already invented.
So just do:

  • Use and reuse existing security incident procedures.
    A good collection can be found here [link]

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.