Talk:Fabric of Security
Appearance
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||
|
Untitled
[edit]Missed [Figure 1 entitled "Access Control Model of Protection"] (mentioned in section of Lampson's Protection Model) ?
Proposed Revisions
[edit]This article is relevant to the current cybersecurity environment but it's poorly written. And from what I can tell, portions of it were copied from the original contributor's academic research. I will do what I can to clean it up and improve it. Several cyber security companies, like Palo Alto Networks, use 'fabric' in their technical jargon. I believe at least a few of those companies' articles on Wikiepdia should link here, after a bit of clean up. I hope others help improve this article.Michael Martinez (talk) 16:01, 15 September 2021 (UTC)
- So it looks like I dithered too long in preparing my proposed changes. Someone from the WikiProject Computer Security Assessment department removed the copyrighted content. I still think the article can be improved. I'll do a little more research and see if I can help out. I encourage any security industry professionals who see this page to consider helping.Michael Martinez (talk) 16:56, 4 October 2021 (UTC)
- While I'd still like to contribute to this article, finding time to do so hasn't been easy. I've been searching for a good source that explains "federated security". I'm not sure but I think this would be an acceptable citation: "Federation". Microsoft documentation. Microsoft. Retrieved November 13, 2021.
Federated security allows for clean separation between the service a client is accessing and the associated authentication and authorization procedures.
The text appears to have been quoted on other sites. Butler_Lampson, who is referenced in the Fabric of Security article, worked for Microsoft in the 1990s. I cannot find a source attributing the definition provided on the Microsoft site to him.Michael Martinez (talk) 07:38, 13 November 2021 (UTC) - I think it would also be helpful to mention more up-to-date concepts, such as Gartner's Cybersecurity Mesh. I don't think that link would be an appropriate source but this is a new concept that Gartner appears to have introduced this year.Michael Martinez (talk) 07:38, 13 November 2021 (UTC)
- While I'd still like to contribute to this article, finding time to do so hasn't been easy. I've been searching for a good source that explains "federated security". I'm not sure but I think this would be an acceptable citation: "Federation". Microsoft documentation. Microsoft. Retrieved November 13, 2021.