1. System Trustworthiness Protection
- File Integrity Protection
- Secure Boot
2. Authentication / Authorization Control
- Identity Authentication
- Permission Control
- Account Management
3. Secure Management
- Log Audit
- Security Upgrade
- Security Event Management
4. Security Detection Response
- Attack Detection
- Intrution Protection
- Anti-DoS/DDoS
5. Data Protection
- Keys Management
- Data Transmission Security
- Data Storage Security
- Personal Data Classification
6. Security Isolation
- Network Isolation
- Applications Isolation
- Comtainer Isolation
- Sandbox Isolation
7. Privacy Protection
- Privacy Control
- Privacy Compliance
- Data Desensitization
8. Security Deployment
- Security Hardening
- Network Scheme Security
- Secure Compilation
声明:本文采用 BY-NC-SA 协议进行授权 | 星期九
原创文章转载请注明:转自《Security Architecture Design Based On 8 Dimension Design Framework》