1. How to Design and Set Architecture for Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platforms

By G. Sargsyan, CGI | R. Binnendijk, CGI

Downloaded: 2418 times

Published: 15 Mar 2022

© 2022 G. Sargsyan | R. Binnendijk

Abstract

This chapter will demonstrate how to design and set architecture for advanced cyber-threat intelligence, detection and mitigation platforms following the example of Cyber-Trust EU research and innovation project [1] applying proven architecture methodology Risk- and Cost-Driven Architecture (RCDA) [2]. The architecture approach RCDA have advantages versus other approaches which helped the consortium partners to agree upon from early stage of platform design and development. According to RCDA principles, the architecture work starts with identifying architectural concerns with the highest impact in terms of risk and cost, and addressing those concerns by making architectural decisions. Hence, this article contains the results of the most impactful architectural decisions made. This has allowed the architecture and requirements processes to mutually benefit from each other’s progress, and resulted in good cohesion between requirements and architecture. The price for this cohesion is some rework in maintaining traceability: In this article we introduces the requirements traceability which is based on an early stage requirements and further extended into references to the output of end user requirements and legal, ethical and data protection frameworks.