Security Patterns

Two basic principles of security are: Our use of patterns is guided by these principles. We can define patterns at all levels. This allows a designer to make sure that all levels are secured, and also makes easier propagating down the high-level constraints. We catalog some of the patterns that apply to each layer, starting from the application layer. We address: We can apply these patterns through a secure system development method that uses different mechanisms based on a hierarchical architecture whose layers define the scope of each security mechanism. This methodology is described in:
Patterns for security models

Top of the Page

Patterns for operating systems
Patterns for operating systems

Top of the Page

Patterns for firewalls and IDS

Top of the Page

Patterns for distributed systems security
Patterns for distributed systems security

Top of the Page

Patterns for web services security

Top of the Page

Patterns for networks

Top of the Page

Patterns for privacy

Top of the Page