Understanding SOA Security Design and Implementation Understanding SOA Security Design and Implementation

Understanding SOA Security Design and Implementation

Publisher Description

Securing access to information is important to any business. Security becomes even more critical for implementations structured according to Service-Oriented Architecture (SOA) principles, due to loose coupling of services and applications, and their possible operations across trust boundaries. To enable a business so that its processes and applications are flexible, you must start by expecting changes – both to process and application logic, as well as to the policies associated with them. Merely securing the perimeter is not sufficient for a flexible on demand business.

In this IBM Redbooks publication, security is factored into the SOA life cycle reflecting the fact that security is a business requirement, and not just a technology attribute. We discuss an SOA security model that captures the essence of security services and securing services. These approaches to SOA security are discussed in the context of some scenarios, and observed patterns. We also discuss a reference model to address the requirements, patterns of deployment, and usage, and an approach to an integrated security management for SOA.

This book is a valuable resource to senior security officers, architects, and security administrators.

GENRE
Computing & Internet
RELEASED
2007
8 November
LANGUAGE
EN
English
LENGTH
496
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
6.2
MB

More Books Like This

Enterprise Security Architecture Using IBM Tivoli Security Solutions Enterprise Security Architecture Using IBM Tivoli Security Solutions
2007
IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager
2011
Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
2015
Building the Infrastructure for Cloud Security Building the Infrastructure for Cloud Security
2014
Official (ISC)2 Guide to the ISSAP CBK, Second Edition Official (ISC)2 Guide to the ISSAP CBK, Second Edition
2013
Evolve the Monolith to Microservices with Java and Node Evolve the Monolith to Microservices with Java and Node
2016

More Books by IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009
IBM Cognos Business Intelligence V10.1 Handbook IBM Cognos Business Intelligence V10.1 Handbook
2010

Customers Also Bought

Security of Networks and Services in an All-Connected World Security of Networks and Services in an All-Connected World
2017
The InfoSec Handbook The InfoSec Handbook
2014
Building Cloud Apps with Microsoft Azure Building Cloud Apps with Microsoft Azure
2014
20 Windows Tools Every SysAdmin Should Know 20 Windows Tools Every SysAdmin Should Know
2013
Managing Risk and Information Security Managing Risk and Information Security
2013
Microsoft Azure Essentials Azure Automation Microsoft Azure Essentials Azure Automation
2015