
Practical Cybersecurity Architecture
By :

"Recently, I've been doing more work with Agile and DevOps environments. One problem in how these models are used is that stories are often used to lay out requirements [for example, "user stories"]. In security, though, many of the architecture requirements stem from stories that are not "functional stories" – instead, they might be invisible or taken for granted from a user point of view. This makes it harder to account for security in the design process, which, in turn, makes architecture even more important in these models."
– John Tannahill, a Canadian management consultant specializing in information security
As we walked through the various phases of the Waterfall architecture, you probably noticed that the stages in a Waterfall development approach aren't very iterative. As illustrated in the typical Waterfall process shown in the previous section, there are stages of development with...
Change the font size
Change margin width
Change background colour