Security architecture is often requested for risk or compliance management because it is a set of documentation that can provide the reviewer with an understanding of your technology and its security controls.
The best way to document the security architecture is to go through each OSI Layer and explain (usually visually), your technology design. Specifically, how you implement the security for each layer.
OSI Model and Security Architecture Diagram Requirements
7 - Application Layer |
|
6 - Presentation Layer |
|
5 - Session Layer |
|
4 - Transport Layer |
|
3 - Network Layer |
|
2 - Data link layer |
|
1 - Physical Layer |
|
If you need help developing your security architecture diagram, please contact us for consultation.
Here are examples of some diagrams to view examples:
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article