Table of Contents: 1- Introduction 2- Security Architecture Approach 3. Network Security: External & Internal Perimeter 4. System & Endpoint Security 5. Application, Identity & Access Security 6. Identity and Access Security 7. Data Security 8. Monitoring and Response, Compliance 9- Conclusion 1- Introduction Numerous web and mobile applications are…