Definition: Architecture Decision Record from where you should specialise the ADR SBBs regarding the Continous Security Monitoring
Source: ISO/IEC/IEEE 42010:2022
Source reference: https://www.iso.org/standard/74393.html
Additional information: Continuous Security Monitoring is a concept in IT architecture that involves the continuous monitoring of an organization's IT infrastructure to detect and respond to security threats in real-time. This approach involves the use of automated tools and processes to monitor network traffic, system logs, and other data sources for signs of suspicious activity. The goal of continuous security monitoring is to identify potential security incidents as early as possible, so that they can be addressed before they can cause significant damage to the organization. This approach is becoming increasingly important as the number and complexity of security threats continue to grow, and as organizations become more reliant on technology to support their operations.
Example: Continuous Security Monitoring:
Decision: Implementing security monitoring tools and processes to continuously monitor and detect security incidents and vulnerabilities.
Rationale: Continuous security monitoring helps identify and respond to security threats promptly, reducing the risk of unauthorized access, data breaches, or service disruptions.
LOST view: Digital Solution Architecture Decisions Catalogue view
Identifier: http://data.europa.eu/dr8/egovera/ContinousSecurityMonitoringGoal
EIRA traceability: eira:DigitalSolutionArchitectureDecisionGoal
ABB name: egovera:ContinousSecurityMonitoringGoal
EIRA concept: eira:ArchitectureBuildingBlock
Last modification: 2023-06-15
dct:identifier: ADR-20230515180947683
dct:title: Architecture Decision Record about Continous Security Monitoring
eira:adr_context: The context explains why we need to make a decision. It also describes the alternatives along with the pros and cons.
eira:adr_decision: The decision describes the justification for why the particular solution was accepted. It has more emphasis on the why rather than the how.
eira:adr_status: [Proposed (under review)|Accepted (approved and ready for implementation)|Superseded (superseded by another decision)]
eira:adr_consecuences: The consequences section contains information about the overall impact of an architectural decision. Every decision has trade-offs. That’s why it’s crucial to include the analysis to provide a clear picture.
|
|
dct:modified | 2024-01-28 |
dct:identifier | ADR-20230515180947683 |
dct:title | Architecture Decision Record about Continous Security Monitoring |
skos:example | Continuous Security Monitoring:
Decision: Implementing security monitoring tools and processes to continuously monitor and detect security incidents and vulnerabilities.
Rationale: Continuous security monitoring helps identify and respond to security threats promptly, reducing the risk of unauthorized access, data breaches, or service disruptions. |
eira:adr_context | The context explains why we need to make a decision. It also describes the alternatives along with the pros and cons. |
eira:adr_decision | The decision describes the justification for why the particular solution was accepted. It has more emphasis on the why rather than the how. |
eira:adr_status | [Proposed (under review)|Accepted (approved and ready for implementation)|Superseded (superseded by another decision)] |
eira:adr_consecuences | The consequences section contains information about the overall impact of an architectural decision. Every decision has trade-offs. That’s why it’s crucial to include the analysis to provide a clear picture. |
eira:concept | eira:ArchitectureBuildingBlock |
eira:definitionSource | ISO/IEC/IEEE 42010:2022 |
eira:definitionSourceReference | https://www.iso.org/standard/74393.html |
skos:note | Continuous Security Monitoring is a concept in IT architecture that involves the continuous monitoring of an organization's IT infrastructure to detect and respond to security threats in real-time. This approach involves the use of automated tools and processes to monitor network traffic, system logs, and other data sources for signs of suspicious activity. The goal of continuous security monitoring is to identify potential security incidents as early as possible, so that they can be addressed before they can cause significant damage to the organization. This approach is becoming increasingly important as the number and complexity of security threats continue to grow, and as organizations become more reliant on technology to support their operations. |
eira:PURI | http://data.europa.eu/dr8/ContinousSecurityMonitoringGoal |
dct:type | eira:ContinousSecurityMonitoringGoal |
skos:definition | Architecture Decision Record from where you should specialise the ADR SBBs regarding the Continous Security Monitoring |
eira:view | Digital Solution Architecture Decisions Catalogue view |
eira:eifLayer | N/A |
skos:broader | http://data.europa.eu/dr8/DigitalSolutionArchitectureDecisionGoal |