Summary
In this chapter, we learned that information security architecture establishes rigorous and comprehensive policies, procedures, and guidelines around the development and operationalization of an information security architecture across the enterprise information technology deployed within an organization.
In this chapter, you learned:
- How to integrate information security architecture into the SDLC/SELC
- How to conduct an information security analysis that supports information security architecture decisions
- How to develop an information security architecture advisement program
In the next chapter, you will learn about information security considerations related to cloud computing implementations. You will learn about the various technologies that are present in the cloud and the tools and techniques needed to secure them.