• Home
  • Foundations
    • OSA Landscape
    • OSA Process Landscape
    • OSA Actors
    • OSA Lifecycle
    • Design principles
    • How to use OSA
    • Writing a Pattern
    • OSA Taxonomy
    • Links to Related Material
  • Definitions
    • IT Architecture
    • IT Risk
    • IT Security Architecture
    • IT Security Pattern
    • IT Security Reqmnts
    • Glossary
  • Library
    • Pattern Landscape
    • Control Catalogue
    • Threat Catalogue
    • Icon Library
    • Pattern Template
  • Community
    • Roadmap
    • Getting Involved
    • Read the blog
    • Discussion Forum
    • Case Studies
    • Contributed Articles
  • About
    • Why have OSA?
    • Who uses OSA?
    • License terms
    • FAQ
  • Home
  • Foundations
    • OSA Landscape
    • OSA Process Landscape
    • OSA Actors
    • OSA Lifecycle
    • Design principles
    • How to use OSA
    • Writing a Pattern
    • OSA Taxonomy
    • Links to Related Material
  • Definitions
    • IT Architecture
    • IT Risk
    • IT Security Architecture
    • IT Security Pattern
    • IT Security Reqmnts
    • Glossary
  • Library
    • Pattern Landscape
    • Control Catalogue
    • Threat Catalogue
    • Icon Library
    • Pattern Template
  • Community
    • Roadmap
    • Getting Involved
    • Read the blog
    • Discussion Forum
    • Case Studies
    • Contributed Articles
  • About
    • Why have OSA?
    • Who uses OSA?
    • License terms
    • FAQ

11.02 Security Architecture Patterns

OSA IT security architecture patterns are based on architectural overview diagrams depicting a certain information usage context. These diagrams are then annotated with references to the NIST controls catalog.

Some patterns that get used repeatedly across many IT Security Architectures are called modules. Examples are the Client as well as the Server module. By breaking up in this way we can keep the majority of patterns much simpler to read and understand, and make building and maintaining patterns easier too.

Filters
List of articles in category 11.02 Security Architecture Patterns
Title Hits
RESERVED SP-012: Secure SDLC Pattern Hits: 18786
RESERVED SP-015: Using Consumer Devices for Enterprise Environments Pattern Hits: 10118
RESERVED SP-017: Secure Network Zone Module Hits: 17883
SP-001: Client Module Hits: 29275
SP-002: Server Module Hits: 34631
SP-003: Privacy Mobile Device Pattern Hits: 12748
SP-004: SOA Publication and Location Pattern Hits: 12561
SP-005: SOA Internal Service Usage Pattern Hits: 14845
SP-006: Wireless- Private Network Pattern Hits: 16345
SP-007: Wireless- Public Hotspot Pattern Hits: 12731
SP-008: Public Web Server Pattern Hits: 197764
SP-009: Generic Pattern Hits: 21680
SP-010: Identity Management Pattern Hits: 37202
SP-011: Cloud Computing Pattern Hits: 130011
SP-013: Data Security Pattern Hits: 52012
SP-014: Awareness and Training Pattern Hits: 11516
SP-016: DMZ Module Hits: 37400
SP-018: Information Security Management System (ISMS) Module Hits: 31681
SP-019: Secure Ad-Hoc File Exchange Pattern Hits: 11418
SP-020: Email Transport Layer Security (TLS) Pattern Hits: 21966
SP-021: Realtime Collaboration Pattern Hits: 8060
SP-022: Board of Directors Room Hits: 13067
SP-023: Industrial Control Systems Hits: 34783
SP-024: iPhone Pattern Hits: 16456
SP-025: Advanced Monitoring and Detection Hits: 21032
SP-026: PCI Full Environment Hits: 25911
SP-998: SVG Test Hits: 8277
SP-999: PDF and Print Test Hits: 17858