␡
- Security Tiers
- On Confluence
- Requirements
- Specifications
- Design and Architecture
- It's Already Designed
- Deployment and Operations Planning
- Summing Up
This chapter is from the book
Deployment and Operations Planning
Think it’s too early in the game to start considering how the system is going to be deployed and operated? Guess again. We’ll come back to this in a lot more detail in Chapter 7, “Operating Software Securely,” but for now it is important for us to be sure to understand how our application is going to get deployed and operated. For example, how are our application components going to integrate into the intrusion detection infrastructure in the organization?