Ontology
Security
Visual Language
Vocabulary
Part 1: Architecture Description
Security Architecture Introduction
Document Conventions and Concepts
Foundational Concepts
High-Level View of the Architecture
Core Security Components
Supporting Security Components
Production Management
Delegation
Wrap-up
Part 2: Interfaces
Introduction
Component Interfaces
Supporting Security Component Interfaces
Core Security Component Interfaces
Production Management Interfaces
Part 3: Security Levels
Security Levels for Core Security Components
Security Levels for Supporting Security Components
Aggregated Security Levels
Intra-Component Automation
Part 4: Software Defined Workflows
Security Goals
Software-Defined Workflows
Authorization Rules
CSAP and Example SDW Components
Part 5: Implementation Considerations
Part 5A: Starting Out
CSAP Recap
CSAP Implementation Basics
The CSAP Zero-Trust Foundation
Implementing the CSAP Zero-trust Foundation
CSAP ZTF to CSAP
Conclusion
Appendix A: Suggested Reading
Part 5B: CSAP Core
Identity and the Authentication Service
Authorization and Authorization Rule Distribution Services
The User Experience
Part 5C: Approaches
The Network
Access Controls
End-to-End Security