Understanding SOA Security Design and Implementation Understanding SOA Security Design and Implementation

Understanding SOA Security Design and Implementation

Publisher Description

Securing access to information is important to any business. Security becomes even more critical for implementations structured according to Service-Oriented Architecture (SOA) principles, due to loose coupling of services and applications, and their possible operations across trust boundaries. To enable a business so that its processes and applications are flexible, you must start by expecting changes – both to process and application logic, as well as to the policies associated with them. Merely securing the perimeter is not sufficient for a flexible on demand business.

In this IBM Redbooks publication, security is factored into the SOA life cycle reflecting the fact that security is a business requirement, and not just a technology attribute. We discuss an SOA security model that captures the essence of security services and securing services. These approaches to SOA security are discussed in the context of some scenarios, and observed patterns. We also discuss a reference model to address the requirements, patterns of deployment, and usage, and an approach to an integrated security management for SOA.

This book is a valuable resource to senior security officers, architects, and security administrators.

GENRE
Computers & Internet
RELEASED
2007
November 8
LANGUAGE
EN
English
LENGTH
496
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
6.2
MB
Enterprise Security Architecture Using IBM Tivoli Security Solutions Enterprise Security Architecture Using IBM Tivoli Security Solutions
2007
IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager
2011
Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
2015
Building the Infrastructure for Cloud Security Building the Infrastructure for Cloud Security
2014
Official (ISC)2 Guide to the ISSAP CBK, Second Edition Official (ISC)2 Guide to the ISSAP CBK, Second Edition
2013
Evolve the Monolith to Microservices with Java and Node Evolve the Monolith to Microservices with Java and Node
2016
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009
The InfoSec Handbook The InfoSec Handbook
2014
Microsoft Azure Essentials Azure Automation Microsoft Azure Essentials Azure Automation
2015
Computer Networking Computer Networking
2018
Programming Windows Store Apps with HTML, CSS, and JavaScript, 2/e Programming Windows Store Apps with HTML, CSS, and JavaScript, 2/e
2014
The Quick Guide to Cloud Computing and Cyber Security The Quick Guide to Cloud Computing and Cyber Security
2013
CS  101 CS  101
2018