
Practical Cybersecurity Architecture
By :

"Be careful with setting scope. If you iterate too much on the scope of what you're trying to secure early on, you may never achieve the first milestone. However, the process and the model by which you create your architecture should absolutely be iterative and the scope will absolutely change. The architectural approaches and models we use need to be able to support these iterative approaches, but very few of the large, monolithic standards will do this "out of the box." This is where there is room for the individual architect to exercise their creativity and innovate, adapting their processes to fit their needs best."
– Steve Orrin, Federal CTO at Intel Corporation
Note right from the get-go that the outcome of this chapter is not about creating documentation. We will eventually document our design scope. This is an important part of the process and, eventually, we will fully document it – ideally, both...
Change the font size
Change margin width
Change background colour