logo

Implementing Security Architecture - Incorporating DMTF

4 Pages762 Words19 Views
   

Added on  2022-08-15

Implementing Security Architecture - Incorporating DMTF

   Added on 2022-08-15

ShareRelated Documents
Running head: IMPLEMENTING SECURITY ARCHITECTURE
Implementing Security Architecture: Incorporating DMTF Redfish protocol in Company X
Name of the Student:
Name of the University:
Implementing Security Architecture - Incorporating DMTF_1
1IMPLEMENTING SECURITY ARCHITECTURE
Review
Security Architecture can be defined as a design architecture which demonstrates the way
through which security inside any company can be maintained to earn measurable long term
commercial profit. The company for which the security architecture is designed here is Company
X. The security protocol that is developed for Company X is DMTF RedFish. The purpose of
using this architecture is to maintain the system’s integrity, availability and confidentiality.
There are different security development mechanisms are available but all the
mechanisms are not applicable for the companies. However, based on the company’s current
status among many security mechanisms the suitable approach has to be chosen to provide high
level data security, availability and integrity. Therefore, based on company’s operational and
functional activities the most suitable security activity and mechanism has to be selected and
applied a well. It gives a completely unique resource path component. It enables the web
applications for consuming the service during the prevention of CSRF attacks. The product’s
tokens and their respective versions can be easily traced with the protocol.
According to Solutions and Meade, (2018), the Redfish management standard uses data
model representation with RESTful interface. This process is much easier to design and
implement as well. Extension of security aspects using this model is also easy and cost effective
than others. Implementation of this model helps to create relationship between programming
environment and all associate components. Humans can also interpret this model easily. For
managing scalable platforms this protocol stands useful. The security protocol is implemented in
Company X to give data confidentiality, security and integrity as well.
Implementing Security Architecture - Incorporating DMTF_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Working of Meltdown and Spectre Exploits
|9
|4028
|491

BN314 - System Architecture
|11
|1202
|121

Network traffic Assignment PDF
|5
|1189
|38

BCO2041 System Analysis and Design
|8
|1207
|288

Micro-service Architecture Assignment
|13
|3587
|14

Improving Security in IoT Systems
|6
|1041
|52