-
Key: IEFRA2-41
-
Status: open
-
Source: Advanced Systems Management Group Ltd. ( Mr. Michael Abramson)
-
Summary:
3.2.3 Weak Integration of Figure 1 with the Text
I really like Figure 1 (Defense-in-Depth for Data Centricity), but the text does not explicitly explain how each layer contributes to security. It assumes the reader will interpret the diagram without guidance. Would it help to talk about how all the things like PAP, PEP, PDP, PPS, SMB, SSG, PPV, DPV all play on this diagram.
Suggest:
"As illustrated in Figure 1, the defense-in-depth model reinforces multiple layers of protection, with Data-Centric Security (DCS) ensuring that security controls extend down to the data itself. Unlike traditional models that focus on network, endpoint, or identity security, DCS ensures security policies remain intact even if perimeter defenses are bypassed." -
Reported: IEF-RA 2.0a1 — Mon, 28 Jul 2025 15:33 GMT
-
Updated: Mon, 28 Jul 2025 15:33 GMT
IEFRA2 — Weak Integration of Figure 1 with the Text
- Key: IEFRA2-41
- OMG Task Force: IEF Reference Architecture 2.0 FTF