
Sign up to save your podcasts
Or


The source material provides an overview of the Complete Security Architecture Framework, which is divided into six progressive phases often structured like a pyramid. These phases—Governance & Strategy, Identity & Access Management, Infrastructure Security, Application & Data Security, Incident Response & Recovery, and Monitoring & Continuous Improvement—build upon each other to create a defense-in-depth approach. The text explains the function of each phase and offers numerous examples of real-world software vendors and tools that organizations use to implement specific security controls, such as Palo Alto for firewalls or Okta for identity management. The source concludes by presenting a full-architecture example and a memory framework (GIIAIM) to help listeners recall the order of the six essential security components.
By Edward Henriquez4.8
44 ratings
The source material provides an overview of the Complete Security Architecture Framework, which is divided into six progressive phases often structured like a pyramid. These phases—Governance & Strategy, Identity & Access Management, Infrastructure Security, Application & Data Security, Incident Response & Recovery, and Monitoring & Continuous Improvement—build upon each other to create a defense-in-depth approach. The text explains the function of each phase and offers numerous examples of real-world software vendors and tools that organizations use to implement specific security controls, such as Palo Alto for firewalls or Okta for identity management. The source concludes by presenting a full-architecture example and a memory framework (GIIAIM) to help listeners recall the order of the six essential security components.

368,699 Listeners

189 Listeners

136 Listeners

32 Listeners