Migration and Security in SOA

Migration and Security in SOA


It is estimated that 90% of most external attacks on applications take advantage of known vulnerabilities and misconfigured systems. While it is unlikely that one could develop 100% secure applications, it may be advisable to analyze vulnerabilities, threats & risks and implement robust security and access-control mechanisms to tackle some of the known, anticipated security threats specifically in SOA initiatives that are increasingly beginning to expose the once secure 'legacy functionality'. Such an approach would not only improve overall system security but also lead to reduced costs (incident response costs, application outage costs, cost of fixing, reputation damage costs, etc.) through increased efficiency and better customer satisfaction levels.

This white paper provides comprehensive guidance on integrating security and access-control best practices into your SOA and WSOA initiatives. It includes the review of topics such as:

  • The different Access control models
  • A meta-model for WSOA (Web service-oriented architecture)
  • Goals of SOA Security
  • SOA Security implementation models
  • Industry standards for SOA Security
  • SOII (Service-Oriented Information Integration), standards for SOII
Torry Harris Business Solutions
03 Mar 2009
03 Mar 2009
21 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor