Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / 34, 42 or 444?

April 21, 2020

34, 42 or 444?

It’s been said that complexity is the biggest problem we face in security, and I’ll argue that it’s doubly true when we’re talking about getting our cloud security architectures right. Because the biggest challenge we ultimately face is determining the answer to the question:

What’s really different about cloud than what I’m already doing?

To answer that simple question, we need to first subdivide cloud into at least 3 major *asS’s (although some have gone rather overboard with this part too)…and then we might need to figure out where those cloud services are actually located, either public, private or hybrid.

And then we have some permutations of those options…

…and then there’s the geographical locations of those options…

…and then we have a set of reference architecture models proposed to help make our lives easier when we talk about it, and the most vendor-neutral one gives us a canvas containing no less than 444 unique elements.

Now some of those elements are controls, and some of those controls might be in 1 to 3 layers of our architecture, and then there’s some things that aren’t controls so that we can help us organize the way we think about our technology infrastructure assets…and then the information and data those assets manipulate…

…and then the people that manage them.

As you can see – and you undoubtedly know from your own experience – it gets to be pretty complicated pretty quickly.

Once you throw your existing security policies and relevant regulatory requirements into the mix, you’d be forgiven for violently throwing it in the “too hard” box, slamming the lid, carrying it out into the back garden…

…and burying it all in the deepest, darkest hole you could dig before dinnertime.

Or…

You could look to find a way to simplify the way you looked at the problem so you could find the smallest set of moving parts you’d need to worry about whenever anyone brought up the word “cloud” in conversation.

Fortunately, you don’t really have to look too far to find that approach.

If you know anything about applying SABSA in practice, you can take the time to roll your own model so that you end up with your own, personally selected and validated set of domains and attributes that you need to worry about in your cloud security architecture efforts.

Now, depending on what else you’re doing, that might take you a bit of time—or it might not. I know it did for me, but then I’ve had 14 years of practice doing this, not to mention access to some super-secret tools that help me build these architectures of anything I like faster than most people.

Alternatively, you can leverage all my own practical work, research, analysis and experience and just read about it in the pages of the April edition of our print newsletter, Security Sanity™. Because in that issue, I talk about how you can cover your cloud *asS’s using between 34 and 42 SABSA attributes sprinkled across only 10-16 domains.

Maybe that sounds like a lot to you, but given that all this is grounded in the 23 predefined domains included in the Baseline Perspectives™ of The Agile Security System™, it means that a lot of the heavy lifting has already been done for you before you even think about cloud or no cloud.

Now, I know I’m a bit later than I’d have liked with this email, but I was a little busy so far this week as I’ve finally managed to clock some reasonable work time in and amongst the household chaos of #SAlockdown and 6 people under one roof with no place to go for over 2 weeks now. So I’m going to keep this one short (and there won’t be another one before the deadline either).

That means you only have just under 6 hours left to ensure you’re subscribed in time to get it delivered to your door after I send it to the printer later this week. And to do that, all you need to do is go right here:

https://securitysanity.com

May you have found a way to find some brief moments of calm amidst the pandemic storm and are managing to keep healthy and…

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Agile Security, Cloud Security, Cloud Security Architecture, SABSA

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.