
Sign up to save your podcasts
Or


In this final installment on architectural considerations, we focus on risk transference, ease of recovery, and the practical realities of patch availability and compute resources. Risk transference involves shifting some security or operational responsibilities to third parties—such as cloud providers, insurers, or managed service vendors—through contracts or service-level agreements (SLAs). While this can offload liability, it must be done with clear understanding of what remains within your control and what doesn’t. Ease of recovery is equally essential, involving strategies like regular backups, replication, and well-documented restoration procedures to ensure that systems can return to full function after compromise or failure. We also discuss how some systems—particularly legacy and embedded platforms—may be unable to receive timely patches or support modern encryption due to limited compute power. These constraints must be factored into both threat modeling and lifecycle planning. Security architecture isn’t just about what a system can do today—it’s about what it will need to do when things go wrong.
By Dr. Jason Edwards5
33 ratings
In this final installment on architectural considerations, we focus on risk transference, ease of recovery, and the practical realities of patch availability and compute resources. Risk transference involves shifting some security or operational responsibilities to third parties—such as cloud providers, insurers, or managed service vendors—through contracts or service-level agreements (SLAs). While this can offload liability, it must be done with clear understanding of what remains within your control and what doesn’t. Ease of recovery is equally essential, involving strategies like regular backups, replication, and well-documented restoration procedures to ensure that systems can return to full function after compromise or failure. We also discuss how some systems—particularly legacy and embedded platforms—may be unable to receive timely patches or support modern encryption due to limited compute power. These constraints must be factored into both threat modeling and lifecycle planning. Security architecture isn’t just about what a system can do today—it’s about what it will need to do when things go wrong.

1,016 Listeners

322 Listeners

140 Listeners

43,997 Listeners