Understanding SOA Security Design and Implementation

IBM Redbooks

Understanding SOA Security Design and Implementation

Securing access to information is important to any business. Security becomes even more critical for implementations structured according to service-oriented architecture (SOA) principles, due to loose coupling of services and applications, and their possible operations across trust boundaries. To enable a business so that its processes and applications are flexible, you must start by expecting changes ñ both to process and application logic, as well as to the policies associated with them. Merely securing the perimeter is not sufficient for a flexible on demand business.

In this IBM Redbook, security is factored into the SOA life cycle reflecting the fact that security is a business requirement, and not just a technology attribute. We discuss a SOA security model that captures the essence of security services and securing services. These approaches to SOA security are discussed in the context of some scenarios, and observed patterns. We also discuss a reference model to address the requirements, patterns of deployment, and usage, and an approach to an integrated security management for SOA.

This IBM Redbook is a valuable resource to senior security officers, architects, and security administrators.
Price: $62.50
Pages: 496
Date Published: May 29, 2008
ISBN: 0738486655
Author: IBM Redbooks
Product Number: SG24-7310-01
Ships in 3-5 days
Why Vervante?

© 2024 Vervante Corporation. All rights reserved.