Security architecture & implementation
Security architecture developed by ON2IT is based on the Zero Trust Strategy: segmentation, visibility, control and protection of your most valuable data.
A tailored Zero Trust approach
Every security architecture ON2IT develops for a client is based on the basic concepts of the Zero Trust Strategy: segmentation, visibility, control and protection of your most valuable data.
This architecture is fully described in the ON2IT Zero Trust Security Framework. However, the approach is always based on the specific technical and organizational context of the client.
After an intake procedure, we elaborate our vision and advice in a so-called high-level design proposal. This does not yet relate to specific hardware, software or cloud services, but serves as a reference architecture.
From design to implementation
After a thorough examination of the high-level design – which of course is drawn up in accordance with Zero Trust – a translation into a detailed design (low-level design) follows. In this low-level design consultants specify the functional design of the chosen strategy, such as network configuration, hardware and software components and managed services.
In the following implementation stage, we set up equipment and software together with the client, but also the processes for user rights or, for example, IT security emergencies.
Once implementation is completed and tested, the ON2IT security consultant provides the delivery documentation. The ON2IT Managed Security Operations Center can then take responsibility for security incident management and monitoring.