Building Your Own Security Architecture Chapter 09: Continuous Delivery

Kunpeng
2 min readJan 10, 2022

The implementation of the solution includes deployment, technical support, customer consultation and so on. This means that the project has only reached phased delivery and is not over. It still needs continuous operation. This chapter introduces the relevant problems in the implementation process and continuous operation to understand continuous delivery.

Customer Centric

Understand the differences of each customer, provide customized services on a unified basis, and continuously improve through PDCA.

Deploy

Complete the deployment of the solution in combination with the infrastructure and meet the architecture quality. For example, use load balancing, complete domain name application and add corresponding DNS resolution, open firewall rules, access log platform, add monitoring alarm, set permission grouping, etc. The whole can be roughly divided into initialization configuration, on-line test, external service, system maintenance, etc.

Operation

The main embodiment of continuous service is operation, which mainly includes daily operation, customer consultation, technical support, special treatment, etc;

Delivery

Based on the existing scheme, deliver new functions according to different requirements.

system integration

Integrate and be integrated by other services. For example, vault is integrated with Nessus and aqua; Integration of HSM with KMS, ad and PKI; NTP and ZABBIX are integrated with many infrastructures;

custom development

The process of integration, deployment and operation can automate daily work. For example, self-service (code scanning, certificate application, etc.), customized services (extending functions, supporting new platforms, etc.);

ALL CHAPTERS:

  1. Building Your Own Security Architecture Chapter 01: Basic Viewpoint
  2. Building Your Own Security Architecture Chapter 02: Know your business
  3. Building Your Own Security Architecture Chapter 03: Know your organization
  4. Building Your Own Security Architecture Chapter 04: Yin and Yang
  5. Building Your Own Security Architecture Chapter 05: Know Your Architecture
  6. Building Your Own Security Architecture Chapter 06: Enterprise Security Architecture Basics
  7. Building Your Own Security Architecture Chapter 07: Security Architecture Basics
  8. Building Your Own Security Architecture Chapter 08: Security Solutions
  9. Building Your Own Security Architecture Chapter 09: Continuous Delivery
  10. Building Your Own Security Architecture Chapter 10: Become A Security Architect

This translation was based on 《安全架构要参:构建企业适用的安全架构》,and if you can read Chinese, please visit https://securityarchitecture.pro/

--

--