What is Data-Centric vs Application-Centric security architecture?

  • 1
  • 70
PeerSpot user

1 Answer

Real User
Oct 4, 2023

Here is an overview of Data-Centric Architecture and Application-Centric Architecture for Security:

Data-Centric Architecture

  • Focus

Protects the data itself, regardless of where it is stored or processed.

  • Benefits

    • May provide a more comprehensive view of data security

    • May be used for Data Protection, whether in transit or at rest

    • May be used to implement Data Loss Prevention (DLP) and other data protection measures

  • Challenges

    • May be complex to implement and manage

    • May require a thorough understanding of the data landscape

Application-Centric Architecture

  • Focus

Protects the applications that access and process data

  • Benefits

    • Implementation and management may be easier

    • May require less understanding of the data landscape

  • Challenges

    • Could leave data vulnerable for applications that are not secured properly

    • May not be able to protect data in transit and at rest.

Use Cases

Data-Centric Architecture

    • Financial Services

    • Healthcare

    • Government

Application-centric architecture

    • E-commerce

    • Media and Entertainment

    • Manufacturing

They say the best security architecture would depend on an organization's needs. If your organization requires protecting sensitive data regardless of where it is stored or processed, then a data-centric architecture may be a good choice. If your organization needs a simpler and more manageable security solution, you may be better off with an application-centric architecture.

Find out what your peers are saying about Sparx Systems, LeanIX, erwin by Quest and others in Enterprise Architecture Management. Updated: November 2023.
745,140 professionals have used our research since 2012.
Search for a product comparison in Enterprise Architecture Management
Security Incident Response
Security Incident Response tools are a category of software solutions designed to assist organizations in detecting, analyzing, and responding to security incidents effectively.
Download Security Incident Response ReportRead more