Index

Numerics

2FA (two-factor authentication), 101102, 103, 109110

2PC (two-phase commit) algorithm, 210

A

ABAC (attribute-based access control), 94

Abadi, D., 65, 175

Abbott, M. L., 140

ACID (atomicity, consistency, isolation, and durability), 61, 64, 210

ACORD (Association for Cooperative Operations Research and Development), 248

agile, 89, 17, 49

architectural decisions, 3031

and architecture, 10

feedback loops, 44

frameworks, 10

AI (artificial intelligence), 127128, 225, 227, 231. See also emerging technologies

chatbots, 238

benefits of an architecture-led approach, 245

Elsie, 239240, 241245

for TFX, 239

alerts, 201202

Allspaw, J., 193

Amazon, 11, 56, 63, 71, 123, 124, 125, 128, 148, 155, 164, 185, 190, 198, 234, 263, 270, 286, 290, 297

Amazon.com, 128, 185

API, 4, 41, 47, 48, 61, 71, 72, 74, 79, 8184, 97, 98, 107, 108, 111, 113, 114, 121, 133, 141, 148, 149, 153, 154, 169, 171, 177, 181, 196, 197, 201, 207, 209, 211, 214216, 250, 254, 257, 273277, 285287, 294

analytics, 55

Apple, 56, 263

application architecture, 67

microservices and serverless scalability, 147150

performance tactics, 170

increaase resources, 172

increase concurrency, 172173

increase resource efficiency, 171

limit rates and resources, 171

prioritize requests, 170

reduce overhead, 171

use caching, 173174

stateless and stateful services, 145146

applying, Continuous Architecture, 16, 1718

ArchiMate, 51

architectural decisions, 2627, 34, 44, 168

accountability, 27

and agile development, 3031

and Continuous Architecture principles, 2930

decision log, 31

delaying, 30, 35

guidelines, 28

integrating with product backlog, 30

Kanban board, 53

making, 28

measurement, 44

performance, 161

and scalability, 128

scalability, 126127

technical debt, 36, 39

architecture, 38

capturing, 3940

code, 37

definitions, 37

managing, 41

production infrastructure, 38

TFX (Trade Finance eXchange) system, 287295

visibility, 2829

architecture, 1, 2, 7, 10, 2022, 262. See also application architecture; Continuous Architecture

and agile, 10

application

microservices, 147

serverless scalability, 147150

stateless and stateful services, 145146

architecture. See also software architecture

and availability, 104105

balancing role of, 2324

big data, 165

building, 260261

conceptual integrity, 24

continuous, 12

and data, 263264

data, 55, 56, 5758

and emerging technologies, 226

essential activities, 24, 2526

drive architectural decisions, 25

feedback loops, 25

focus on quality attributes, 24

managing technical debt, 25

feedback loops, 44

intentional, 10

and ML (machine learning), 232, 233234

in the modern era, 267268

and performance, 159160

principles, 49

and resilience, 188190

and scalability, 124, 134

security, 8889

serverless, 148, 165166167

tactics definition, 34, 35

team-owned, 4950

and threat mitigation, 101

artificial Intelligence. See AI

ASVS (application security verification standard), 91

asynchronous communications, 201202

ATAM utility tree, 35

attack trees, 9798, 120

auditing, 101, 106

authentication, 101102, 103, 109110

authorization, 101

automation, 25

availability, 104105, 162163, 189, 191192

high, 187, 189190, 196

MTBF (mean time between failures), 192193

RPO (recovery point objective), 193194

RTO (recovery time objective), 193194

and security, 89

B

backpressure, 206207

backups, 213214

Barth, D., Zero Trust Networks, 110

Bass, L., 34

Software Architecture in Practice, 160, 170

Beck, K., 8

benefits

of Continuous Architecture, 15

of continuous testing, 4648

Benioff, M., 187

big data, 165, 225

MapReduce, 177178

Bitcoin, 246, 248, 299

Bittner, K., xix

blockchains, 246. See also DLTs (distributed ledger technologies); shared ledger

51% attack on, 300

capabilities, 248, 249

blueprints, 23, 6

Bondi, A. B., Foundations of Software and System Performance Engineering: Process, Performance Modeling,Requirements, Testing, Scalability, and Practice, 168

Brewer, E., 65, 212

Brooks, F., The Mythical Man Month, 24, 50

Brown, S., 10, 51

bulkheads, 204205

C

C4, 51

caching, 140141, 173174, 205206

application object, 141

CDN (content delivery network), 142

database object, 141

lookaside, 205

precompute, 142

proxy, 141142, 205

static, 142

CAP theorem, 65, 212

CAPEC (Common Attack Pattern Enumeration and Classification), 100, 120

CDN (content delivery network), 142

chaos engineering, 218

chatbots, 238

for TFX, 239

CIA (confidentiality, integrity, availability) triad, 9091

circuit breakers, 208209

classification, 227

Clements, P., Software Architecture in Practice, 34, 160, 170

client analytics, 7172

cloud computing, 4, 11, 161

containers, 133

FaaS (Function as a Service), 147

horizontal scalability, 132134

load balancers, 133

public/commercial, performance, 165166

scalability, 127

secrets management, 108

and software architecture, 8

cluster analysis, 228

commands, 69

compensation (for database consistency), 211212

confidentiality, 9091

configurability, 35

Continuous Architecture, 12, 23, 24, 25, 27, 28, 30, 31, 35, 38, 50, 51, 55, 56, 159, 167, 259, 261262, 268

applying, 16, 1718

benefits, 15

cost effectiveness, 162163

cost-quality-time triangle, 1516

and data, 55, 57

data ownership, 7677, 78

definitions, 1315

feedback loops, 42

continuous testing, 4548

fitness function, 45

implementing, 4344

microservices, 147

versus other software architecture approaches, 1415

principles, 13, 2930

scale dimension, 1718

schema evolution

Expand and Contract pattern, 83

intercomponent, 82

intracomponent, 83

Postel’s law, 83

and software architecture, 14

software delivery speed, 17

and sustainability, 1617

Corda Alastria, 299

Corda Network, 299

Corda R3, 299

cost effectiveness, 162163

cost-quality-time triangle, 1516

CQRS (Command Query Responsibility Segregation), 69

cross-tenant analytics, 73

cryptographic hashing, 102, 246

Cunningham, W., 36

D

DaD (Disciplined Agile Delivery), 10

data, 55, 56, 65, 83, 263. See also metadata

and architecture, 263264

and Continuous Architecture, 57

creating a common language, 5860

denormalization, 174175

distribution, 81

Domain-Driven Design, 5859

bounded contexts, 59

ubiquitous language, 59

integration, 7980

lineage, 56, 79

managing, 60

NoSQL, 64

document database schema, 62, 66

graphs, 63

key-value, 62

technology type comparison, 63

wide columns, 62

ownership, 7677, 78

polyglot persistence, 61

race conditions, 78

schema evolution, 8284

Expand and Contract pattern, 83

intercomponent, 82

intracomponent, 83

Postel’s law, 83

data analytics, 7071

client analytics, 7172

cross-tenant analytics, 73

schema on read, 70

tenant analytics, 73

TFX analytics approach, 7476

data architecture, 56

databases, 6768. See also data technology; NoSQL; TFX (Trade Finance eXchange) system

backups, 213214

caching, 140141

application object, 141

CDN (content delivery network), 142

database object, 141

precompute, 142

proxy, 141142

static, 142

checking, 213

data distribution, 139140

partitioning, 139140

performance tactics, 174

data denormalization, 174175

full-text search, 176177

indexes, 174

materialized views, 174

NoSQL, 175176

relational, 65, 66, 68

replication, 73, 139140, 212213

scalability, 137139

DDD (Domain-Driven Design), 163, 171

denial of service, 9597, 104105, 111

deep learning. See DL

DevOps, 5, 38, 218219, 220

DevSecOps, 5

shifting security left, 9192

DIKW pyramid, 57, 70

disaster recovery, 221222

Distributed Saga pattern, 211212

DL (deep learning), 227, 229. See also emerging technologies

neural networks, 229

DLTs (distributed ledger technologies), 246, 254255

capabilities, 248, 249

smart contracts, 249

use cases, 247248

Doctorow, C., 87

Domain-Driven Design, 29, 5859

bounded contexts, 59

ubiquitous language, 59

E

elastic scalability, 166

elevation of privilege, 96

emerging technologies, 226

AI (artificial intelligence), 227, 231

chatbots, 238, 239, 245

Elsie, 239240, 241245

and architecture, 226

blockchains, 246

DL (deep learning), 227, 229

DLTs (distributed ledger technologies), 246

capabilities, 249

smart contracts, 249

ML (machine learning), 227

architecture concerns, 232

document classification for TFX, 232233

reinforcement learning, 228229

supervised learning, 227228

for TFX, 230231, 233234236237, 238

training, 231

unsupervised learning, 228

and nontechnical stakeholders, 250

shared ledgers

benefits of an architecture-led approach, 256257

capabilities, 248250

comparison of technical implementations, 299300

permissioned, 248249

for TFX, 250251, 254255

use cases, 247248

enterprise architects, 67, 12

Erder, M., Continuous Architecture: Sustainable Architecture in an Agile and Cloud-Centric World, 23, 50, 125, 147

Ethereum, 246, 248, 299

Evans, E., 59

Event Sourcing, 55, 6769

events, 69

eventual consistency, 65, 211

Expand and Contract pattern, 83

expected maximum load testing, 169

Extreme Programming Explained, 8

F

FAANG (Facebook, Amazon, Apple, Netflix, and Google), 56, 263

FaaS (Function as a Service), 147

Facebook, 5, 56, 124, 125, 164, 190, 263

failures, 189. See also availability; resilience

allowing for, 195199

inevitability of, 190191

learning from success, 199

MTBF (mean time between failures), 192193

MTTR (mean time to recover), 192193

prevention, 191

Fairbanks, G., 10

faults, 189

feedback loops, 25, 42

agile, 44

and architecture, 44

continuous testing, 4548

fitness function, 45

implementing, 4344

Fisher, M. T., 140

five ages of software systems, 45

Ford, N., Building Evolutionary Architectures, 45

frameworks, agile, 10

full-text search engines, 176177

functional requirements, 34

G

Gamma, E., Design Patterns, 52

Gang of Four, 52

GDPR (General Data Protection Regulation), 87, 99

Gilman, E., Zero Trust Networks, 110

GitHub, 27

Google, 5, 11, 56, 110, 123, 124, 125, 152, 155, 157, 164, 166, 187, 190, 221, 223, 263, 297, 306

Gorton, I., 165, 175

guidelines, 28, 4849

H

Hacking Team, 109

health checks, 200201

Helm, R., Design Patterns, 52

high availability, 189190. See also availability; resilience

horizontal scalability, 129132134

I

International Federation for Information Processing (IFIP), 2

International Standards Organization and Institute of Electrical and Electronics Engineers (IEEE), 2

incident management, 202, 220221

indexes, 174

information disclosure, 96

information integrity, 102103

information privacy, 102103

injection attacks, 113

intentional architecture, 10

intercomponent schema evolution, 82

Internet, 4, 56, 89

intracomponent schema evolution, 83

ISO/IEC 25010, 32

J-K

Johnson, R., Design Patterns, 52

Kanban board, 53

Kazman, R., Software Architecture in Practice, 34, 160, 170

Keras, 227

Kersten, M., 41

key rotation, 108

key-value, 62

KMIP (key management interoperability protocol), 108

Klein, J., 165, 175

Kruchten, P., 37

L

lambdas, 148, 149

latency, 160, 161, 167168. See also performance

L/C (letters of credit), 58, 60, 9798, 134, 226, 232, 270

issuance, 251254

Leffingwell, D., 10

LeSS (Large Scale Scrum), 10

load balancers, 133, 200201

load shredding, 207208

logs, 217, 219220

M

making architectural decisions, 28

managing

data, 60

technical debt, 41

machine learning. See ML

MapReduce, 177178

materialized views, 174

measurement

performance, 161163, 180182

resilience, 199200

TFX scalability, 151152

message logging, 106107

message-based asynchronous communication, 201202

metadata, 79

metrics, 217, 219220

microservices, 61, 147

and performance, 163164

Microsoft, 3, 11, 95, 120, 171, 297, 304

minimum viable products (MVPs), 16

ML (machine learning), 225, 227. See also AI (artificial intelligence)

architecture concerns, 232

document classification for TFX, 232233

pipelines, 233, 234, 235, 236, 238, 241

reinforcement learning, 228229

supervised learning, 227228

for TFX, 230231, 233234

benefits of an architecture-led approach, 238

common services, 238

data ingestion, 234235

data preparation, 235236

model deployment, 236237

model monitoring, 237

training, 231

unsupervised learning, 228

monitoring, 217, 219

MTBF (mean time between failures), 192193

MTTR (mean time to recover), 192193

MVPs (minimum viable products), 16

N

Netflix, 56, 123, 124, 125, 152, 155, 164, 169, 190, 218, 223, 263

NLU (natural language understanding), 239, 241, 242, 244, 245

nonrepudiation, 103104

Nord, R., Managing Technical Debt, 37

normal load testing, 169

NoSQL, 55, 60, 64, 65

CAP theorem, 65

data denormalization, 174175

document database schema, 62, 66

eventual consistency, 65

graphs, 63

key-value, 62

performance, 164165, 175176

technology choices, 64, 164165

technology type comparison, 63

wide columns, 62

O

OCR (optical character recognition), 231, 233, 235

OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation), 100, 120

Open Source, 7

operational visibility, 216217, 219

OMG (Object Management Group), 51

OWASP (Open Web Application Security Project), 91, 115, 121

Ozkaya, I., Managing Technical Debt, 37

P

PACELC, 65, 175

Parsons, R., Building Evolutionary Architectures, 45

PASTA (Process for Attack Simulation and Threat Analysis), 100, 120

performance, 159, 266

achieving for TFX, 178180

application architecture tactics, 170

increase resources, 172

increase concurrency, 172173

increase resource efficiency, 171

limit rates and resources, 171

modeling and testing, 167, 168

prioritize requests, 170

reduce overhead, 171

use caching, 173174

and architecture, 159160

bottlenecks, 182183, 243

databases, 174

data denormalization, 174175

full-text search, 176177

indexes, 174

materialized views, 174

NoSQL, 175176

latency, 160, 161

MapReduce, 177178

measurements, 161163

measuring, 180182

and microservice architectures, 163164

modeling, 167168

and NoSQL technology, 164165

and public/commercial clouds, 165166

resource demand, 161

and scalability, 160

and serverless architectures, 166167

testing, 168170

throughput, 160, 161

turnaround time, 161

polyglot persistence, 55, 61

Postel’s law, 83

principles, 4849

of Continuous Architecture, 13, 2930

privacy, 87. See also security

confidentiality, 90

information, 102103

product backlog, integrating with architectural decisions, 30

Pureur, P., Continuous Architecture: Sustainable Architecture in an Agile and Cloud-Centric World, 23, 50, 125, 147

Q

quality attributes, 3234, 125

and architectural tactics, 34, 213

availability, 189, 191192

MTBF (mean time between failures), 192193

RPO (recovery point objective), 193194

performance, 159160, 174, 266

architectural concerns, 161163

bottlenecks, 182183

data denormalization, 174175

forces affecting, 160161

full-text search, 176177

increase resources, 172

increase concurrency, 172173

increase resource efficiency, 171

indexes, 174

limit rates and resources, 171

MapReduce, 177178

materialized views, 174

and microservice architectures, 163164

modeling, 167168

and NoSQL technology, 164165, 175176

prioritizing requests, 170

and public/commercial clouds, 165166

reduce overhead, 171

serverless architecture, 166167

testing, 168170

TFX requirements and tactics, 178180

use caching, 173174

resilience, 187, 190, 194195, 266267

achieving, 214215

allowing for failure, 195199

architectural tactics, 200

backpressure, 206207

backups, 213214

bulkheads, 204205

defaults and caches, 205206

disaster recovery, 221222

health checks, 200201

incident management, 220221

inevitability of failures, 190191

load shredding, 207208

maintaining, 216

measurement, 199200

message-based asynchronous communication, 201202

operational visibility, 216217

in organizations, 195

replication, 212213

rollback and compensation, 210212

RPO (recovery point objective), 193194

RTO (recovery time objective), 193194

testing for, 217218

TFX system requirements, 196199

timeouts and circuit breakers, 208209

watchdogs and alerts, 201202

scalability, 123, 124, 125127, 162163, 265266

architectural context, 124

and architecture, 134

asynchronous communications, 142145

caching, 140142

cloud computing, 127

database, 137139

elastic, 166

failures caused by, 152

horizontal, 129132134

microservices, 147

and performance, 160

requirements, 125

serverless, 147150

stateless and stateful services, 145146

supply-and-demand forces, 128

TFX (Trade Finance eXchange) system, 128129, 134137, 151152

vertical, 129

security, 87, 8889, 90, 92, 94, 101, 264265

architectural context, 8889

availability, 104105

CIA triad, 9091

confidentiality, 90

continuous delivery, 116117

implementation, 115

incident management, 202

information integrity, 102103

Internet, 89

message logging, 106107

monitoring, 106107

nonrepudiation, 103104

people, process, and technology, 115116

preparing for failure, 117118

secrets management, 107109

shifting left, 9192

social engineering mitigation, 109110

specialists, 91

STRIDE, 9597

TFX (Trade Finance eXchange) system, 111115

threat modeling and mitigation, 92-93, 9798, 100, 101102

threats, 92, 9596, 9899

weakest link principle, 116

zero-trust networks, 110111

utility tree, 3536

working with, 35

Quorum, 299

R

ransomware attacks, 105

Rasa Open Source, 239

rate limiting, 207208

RBAC (role-based access control), 94, 101

relational databases, 65, 66, 68

reliability, 189, 191. See also availability

replication, 212213

repudiation, 96

resilience, 187, 190, 194195, 266267

architectural tactics, 200

backpressure, 206207

backups, 213214

bulkheads, 204205

checks (for data consistency), 213

defaults and caches, 205206

health checks, 200201

load shredding, 207208

message-based asynchronous communication, 202203

replication, 212213

rollback and compensation (for data consistency), 210212

timeouts and circuit breakers, 208209

watchdogs and alerts, 201202

and architecture, 188190

and continual improvement, 194195

and DevOps, 218219

disaster recovery, 221222

failures, 189, 190191, 195199

faults, 189

four aspects of, 191

five nines, 192

incident management, 220221

the inevitability of failure, 190191

maintaining, 216

measurement, 199200

MTBF (mean time between failures), 192194

MTTR (mean time to recover), 192193

operational visibility, 216217

in organizations, 195

testing for, 217218

types of resilience mechanisms, 198

RTO (recovery time objective), 193194

testing for, 217218

TFX (Trade Finance eXchange) system

achieving, 214215

requirements, 196199

resources, 81

increasing efficiency, 171

limiting, 171

and performance, 161

REST (representational state transfer), 8182, 143, 163

robustness principle, 83

rollbacks, 210212

RPO (recovery point objective), 193194

RTO (recovery time objective), 193194

RUP (Rational Unified Process), 9

S

SaaS (Software as a Service), 8

SAFe (Scaled Agile Framework), 10

SAFECode, 115, 121

Salesforce, 11, 297

scalability, 123, 124, 125127, 162163, 265266

architectural context, 124

and architecture, 134

asynchronous communications, 142145

caching, 140141

application object, 141

CDN (content delivery network), 142

database object, 141

precompute, 142

proxy, 141142

static, 142

cloud computing, 127

database, 137139

elastic, 166

failures caused by, 152

horizontal, 129132134

microservices, 147

and performance, 160

requirements, 125

serverless, 147150

stateless and stateful services, 145146

supply-and-demand forces, 128

TFX (Trade Finance eXchange) system, 128129, 134137

achieving, 151

measuring, 151152

vertical, 129

schema

evolution, 8284

Expand and Contract pattern, 83

intercomponent, 82

intracomponent, 83

Postel’s law, 83

on read, 70

Schneier, B., 118

SDM (service delivery management), 220

secrets management, 107109

key rotation, 108

passwords, 108109

security, 87, 90, 264265

architectural context, 8889

availability, 104105

CIA triad, 9091

confidentiality, 90

continuous delivery, 116117

implementation, 115

incident management, 202

information integrity, 102103

Internet, 89

message logging, 106107

monitoring, 106107

nonrepudiation, 103104

people, process, and technology, 115116

preparing for failure, 117118

secrets management, 107109

shifting left, 9192

social engineering mitigation, 109110

specialists, 91

STRIDE, 9597

TFX (Trade Finance eXchange) system, 111115

theater, 118119

threat modeling and mitigation, 9293, 100

analyze, 93

architectural tactics for mitigation, 101

attack trees, 9798

authentication, authorization, and auditing, 101102

mitigate, 94

understand, 93

threats, 92

high-impact, 99

identification, 9596

prioritizing, 9899

weakest link, 116

zero-trust networks, 110111

SEI (Software Engineering Institute), 27, 35, 38, 64, 121, 176, 185, 231, 256

Semantic Web, 80

serverless architecture

performance, 166167

scalability, 147150

shared ledgers, 225. See also DLTs (distributed ledger technologies); emerging technologies

benefits of an architecture-led approach, 256257

capabilities, 248250

comparison of technical implementations, 299300

permissioned, 248249

for TFX, 250251

L/C issuance using a DLT, 251254

L/C payment using a DLT, 254255

use cases, 247248

shifting security left, 9192

smart contracts, 249

social engineering mitigation, 109110

software architecture, 12, 1112, 225, 259. See also Continuous Architecture

and agile, 89

blueprints, 23, 6

challenges, 56

cloud computing, 8

focus on business content, 6

perception of architects as not adding value, 67

slow architectural practices, 78

Continuous Architecture, 1415

definitions, 2

deployment, 5

five ages of software systems, 45

future directions, 11

goals, 23

and the Internet, 4

key skills, 4950

trends

models and notations, 5152

patterns and styles, 52

principles as architecture guidelines, 4849

team-owned architecture, 4950

value of, 261

software delivery life cycle (SDLC), 15

software industry, 3

software systems

AI (artificial intelligence), 127128

cloud computing, 166

functional requirements, 34

performance modeling, 167168

quality attributes, 3234

and architectural tactics, 34

utility tree, 3536

working with, 35

scalability, 128

software supply chain, 89

solution architects, 67

spoofing, 96

sprints, 30

SQL, 60, 64. See also NoSQL

SSO (single sign on), 94

stateful services, 145146

stateless services, 145146

stress testing, 137, 138, 139, 169

STRIDE, 9597

sustainability, 1617

SWIFT (Society for Worldwide Interbank Financial Telecommunication), 248, 257

T

tampering, 96

team-owned architecture, 4950

technical debt, 25, 36, 39

architecture, 38

capturing, 3940

code, 37

definitions, 37

managing, 41

production infrastructure, 38

technology singularity, 39

tenant analytics, 73

TFX (Trade Finance eXchange) system, 1920, 23, 47, 55, 59, 66, 99, 159, 214, 226, 270. See also security; trade finance case study

achieving performance, 178180

achieving resilience, 214

achieving scalability, 151

achieving security, 111115

architectural decisions, 287295

architectural description, 271272

deployment view, 285287

functional view, 272276

information view, 283285

usage scenarios, 276282

attack trees, 9798

authentication, authorization, and auditing, 101102

and availability, 105

bulkheads, 204205

caching, 142, 205206

chatbots, 239

data analytics, 707172

database technology choices, 65

databases, 6162

data distribution, replication, and partitioning, 139140

technology choices, 64, 164165

domain events, 69

Elsie, 239240

federated architecture, 243245

natural language interface, 241242

performance and scalability, 242243

query handling, 243

Good Tracking Service, 66

horizontal scalability, 129132

information privacy and integrity, 103

L/C (letters of credit), 270

letter of credit use cases, 2022

message bus, 144

ML (machine learning), 230231

architecture approach, 233234

common services, 238

data ingestion, 234235

data preparation, 235236

document classification, 232233

model deployment, 236237

model monitoring, 237

multitenancy, 296297

performance

bottlenecks, 182183

caching, 173174

increasing concurrency, 172173

increasing resource efficiency, 171

increasing resources, 172

limiting rates and resources, 171

measuring, 180182

prioritizing requests, 170

reducing overhead, 171

requirements and tactics, 178180

quality attribute requirements, 297

resilience, 187188

achieving, 214215

requirements, 196199

RPO (recovery point objective), 194

RTO (recovery time objective), 194

scalability, 124, 128129

achieving, 151

asynchronous communications, 142145

bottlenecks, 136

database, 137139

failures caused by, 152

measuring, 151152

requirements, 134137

stateless and stateful services, 145146

security monitoring, 106107

sensors, 127128

shared ledgers, 250251

L/C issuance using a DLT, 251254

L/C payment using a DLT, 254255

and STRIDE, 9697

timeouts and circuit breakers, 209

threat modeling and mitigation, 9293, 100. See also STRIDE

analyze, 93

architectural tactics for mitigation, 101

attack trees, 9798

authentication, authorization, and auditing, 101102

high-impact threats, 99

injection attacks, 113

mitigate, 94

nonrepudiation, 103104

prioritizing threats, 9899

ransomware attacks, 105

STRIDE, 9597

understand, 93

throughput, 160, 161. See also performance

timeouts, 208209

traces, 217, 219220

U-V-W

UML (Unified Modeling Language), 51, 208, 214

URIs (uniform resource identifiers), 59

usability, 162163

VAST (Visual Agile and Simple Threat) modeling, 100, 120

vertical scalability, 129

von Neumann, J., 39

watchdogs, 201202

Web Service Definition Language (WSDL), 147

weakest link principle, 116

Weir, C., 120

Workday, 11

X-Y-Z

XP (Extreme Programming), 8, 9

Yates, A., 38

zero-trust networks, 110111

zones of trust, 110

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.109.30