Skip to content

Commit 6d1fd8d

Browse files
committed
readme update
1 parent 0cac5e4 commit 6d1fd8d

File tree

1 file changed

+15
-16
lines changed

1 file changed

+15
-16
lines changed

README.md

Lines changed: 15 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,39 @@
1-
[![Documentation Status](http://readthedocs.org/projects/security-and-privacy-reference-architecture/badge/?version=latest)](http://security-and-privacy-reference-architecture.readthedocs.io/en/latest/?badge=latest)
21

3-
# SecurityPrivacyReferenceArchitecture
4-
Open Repository for the Open Security and Privacy Reference Architecture
2+
# Open Security Reference Architecture
53

6-
Open publications for IT security and privacy are still rare. Despite the great work of the OWASP foundation many valuable resources for Security and Privacy are not open. Security and Privacy is technological complex and real risks mitigation is still problematic and expensive.
4+
IT Security is a complex field. People, processes and technology are crucial parts of an architecture to reduce risks. Our certified experts love to solve your cyber security challenges. Detecting what is not good with your current security is the simple work. You can find many companies that launch automated test suites based on open source tools that tell you that you are not secure enough. However the real challenge is designing solutions that are secure.
5+
6+
7+
Open publications for cyber security are still rare. Despite the great work of the [OWASP](https://owasp.org) foundation many valuable resources for Security are not open.
8+
9+
This reference architecture aims to enable you to create better and faster security solutions. You SHOULD use and reuse content that is provided in this reference architecture to prevent reinventing the wheel.
710

8-
This reference architecture aims to enable you to create better and faster security and privacy solutions. This by reusing content that is provided in this reference architecture or by directing you to open (cc-by) resources to prevent reinventing the wheel.
911
To encourage collaboration for this project this reference architecture is of course free and open (cc-by-sa).
1012

1113
This project is supported by the BM-Support Foundation, https://www.bm-support.org/
1214

1315
Current status: We are working on a update for the 2022 [hardcopy](https://www.amazon.de/Open-Reference-Architecture-Security-Privacy/dp/1540606481/ref=sr_1_2?ie=UTF8&qid=1480495211&sr=8-2&keywords=maikel+mardjan) version of this 'Open Reference Architecture for Security and Privacy'. But the online version will always be up-to-date!
1416
So join the party and join the team to make this Open resource better!
1517

18+
The initial version (2015) of this project was called the 'Open Reference Architecture for Security and Privacy'.However we decided to split the project in a security Playbook and a privacy playbook. Content for this Security Reference Architecture is partly derived from the original 2015-2021 publication, but heavily edited and improved.
19+
1620

1721
# Contributing
1822

1923
We encourage all security professionals to improve this reference architecture. Join the team to:
2024

21-
* Add security or privacy principles.
22-
* Add security or privacy models.
23-
* Help us create the largest OSS reference framework on OSS security and privacy applications and tools.
25+
* Add open (cc-by) security resources.
26+
* Add security models.
2427
* Create better graphics and text.
2528
* Add threat models that can be easily reused.
2629
* Improve criteria on selecting OSS solutions for security and privacy applications.
2730
* Create tools to speed up the process of making your security architectures or privacy designs with use of this reference architecture (and tools).
2831

29-
Your contributions to this Guide are greatly appreciated as long as contributions fit within the scope and goal of this security and privacy reference architecture. As an open project, this Open Reference Architecture for Security and Privacy shall always remain vendor-neutral and freely available for all to use. If you contribute you will of course get credit (mentioned in upcoming publications).
30-
31-
32-
With the exception of typos and spelling mistakes (feel free to fix these and they’ll be merged), please observe the following guides:
32+
Your contributions to this Guide are greatly appreciated as long as contributions fit within the scope and goal of this security reference architecture. As an open project, this Security Architecture shall always remain vendor-neutral and freely available for all to use. If you contribute you will of course get credit (mentioned in upcoming publications).
3333

34-
* Always open an issue first. This will allow us to determine whether or not the change should take place.
35-
* Explain your issue, and we will discuss it with you. If we agree the change is necessary we will mark it as TODO and will fix it when we get a chance, or we will allow a member of the community to supply the change with a pull request.
36-
* This reference architecture is intended to be a helpful resource aimed at professional security/privacy architects and engineers.
37-
* Contributions must fit within the scope and goal of this security and privacy reference architecture. Of course we like to discuss your input for changing scope or goals if needed!
34+
* This reference architecture is intended to be a helpful resource aimed at professional security architects and engineers.
35+
* Contributions must fit within the scope and goal of this security reference architecture.
36+
* All contributions to resources must be open. E.g. cc-by licensed)
3837

3938
For small corrections or input, just send me an email. For larger contributions, please create a pull request.
4039

0 commit comments

Comments
 (0)