Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security Strategy (Access (Connectivity (Encryption, Boundaries and…
Security Strategy
Access
Connectivity
Encryption
Boundaries and Segmentation
Traffic Management
IAM
Roles
Business Roles
System Roles
Access Rights
Identity Providers
Directories / Repositories
Identity Lifecycle Management
Privileged Access Management
Assertion
Authentication / Authorization
Trusts (e.g. FedID)
Access Controls
Data
Data Classification
Data Protection
Encryption
Backups
Access Controls
Access Rights
Services
Hosting
Data Center Security (physical)
Immutable Infrastructure
Cloud Security (virtual)
Vulnerability Management
Automation
Monitoring / Logging / Alerting
Applications
Source Code Security
Source Code Management
Database Security