Security Architecture Best Practices
How can you best implement the neo-security architecture? Learn about architecting APIs and identity to strengthen network and cloud security.
A security architecture covers the building blocks used to protect an enterprise's IT infrastructure. Implement a scalable future proof security architecture that allows you to approach the identity landscape for API driven systems the right way
![Federation Requirements Introduced in FIPS 201-3](/images/resources/neo_security/fips/fips-201-3-title-curity.png)
Federation Requirements Introduced in FIPS 201-3
An overview of FIPS 201-3 and SP 800-C3, listing the requirements and explaining how OpenID Connect fits into the picture.
![Privacy and GDPR Using OAuth](/images/resources/neo_security/privacy/privacy-and-gdpr-using-oauth-curity.png)
Privacy and GDPR Using OAuth
How to comply with privacy regulations and GDPR, using OAuth. Incorporate User Privacy Design in your organization's architecture to keep data safe and meet regulations.
![Open Policy Agent: Integration Overview](/images/resources/neo_security/opa-integration-curity.jpg)
Open Policy Agent: Integration Overview
What is Open Policy Agent (OPA) and how does it work? Find out how Curity's Identity Server and OPA can create strong user authentication.
![Integrate Identity with Business Data](/images/resources/architect/integrate-identity-business-data-curity.png)
Integrate Identity with Business Data
Protect business data with an Identity and Access Management System. In this article, we provide design choices and guide you through the integration process
![The Token Handler Pattern for Single Page Applications](/images/resources/neo_security/token-handler/token-handler-pattern-curity.jpg)
The Token Handler Pattern for Single Page Applications
Learn how to secure an SPA using an API-driven Backend for Frontend, for the best all-round architecture
![Zero Trust Architecture is a Token-Based Architecture](/images/resources/neo_security/zta/zero-trust-architecture-curity.png)
Zero Trust Architecture is a Token-Based Architecture
What is Zero Trust Architecture (ZTA), and why is it essential to implement Zero Trust Security to protect your resources? Build a Zero Trust Model.
![Identity and Access Management Primer](/images/resources/neo_security/iam-primer/iam-primer-curity.png)
Identity and Access Management Primer
Basic IAM concepts and practical advice on how best to implement Identity and Access Management for any business.