
Architecture Security Considerations (Part 3) (Domain 3)
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
-
Narrado por:
-
De:
Acerca de esta escucha
In this final installment on architectural considerations, we focus on risk transference, ease of recovery, and the practical realities of patch availability and compute resources. Risk transference involves shifting some security or operational responsibilities to third parties—such as cloud providers, insurers, or managed service vendors—through contracts or service-level agreements (SLAs). While this can offload liability, it must be done with clear understanding of what remains within your control and what doesn’t. Ease of recovery is equally essential, involving strategies like regular backups, replication, and well-documented restoration procedures to ensure that systems can return to full function after compromise or failure. We also discuss how some systems—particularly legacy and embedded platforms—may be unable to receive timely patches or support modern encryption due to limited compute power. These constraints must be factored into both threat modeling and lifecycle planning. Security architecture isn’t just about what a system can do today—it’s about what it will need to do when things go wrong.