Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / 5 things your security architecture MUST do

February 22, 2019

5 things your security architecture MUST do

What do you really know about security architecture and what it should do for you?

I’ve mentioned it a couple of times over the last few weeks, but I haven’t yet given it the attention it deserves. So today, we’re going to start fixing that problem.

Tomorrow, we’ll do a slightly deeper dive on the concept itself, but today I wanted you to think about why you should care about it. And I also wanted to highlight why I think it’s such a big deal.

So, when you think of “security architecture” how do you measure it’s value? Do you even have one that’s planned and not emergent?

HINT (and a preview of tomorrow’s piece): it’s not a bunch of documents—especially those stuffed in a drawer or lost on a file share somewhere.

If it was, you might easily get into “My SA’s bigger than your SA. Just look at all these pages! And those diagrams! Wow, aren’t they sexy?” kinds of arguments with your peers over drinks at RSA in a couple of weeks.

And that would be silly.

Let’s cut to the chase. Here’s the list of the 5 things your security architecture MUST do if it’s going to be worth the effort and deliver real value to you and the organization.

To do all that, it must:

  1. demonstrate understanding and alignment with the business,
  2. codify security control decisions as guidelines and blueprints for new projects,
  3. enable efficient and effective triage of security threats and incidents,
  4. visualize and communicate risk exposure and control capabilities, and
  5. illustrate and communicate risk ownership and risk governance roles and responsibilities

How’d you score?

20%…80%…100%…

…or 0%?

I’m not going to mice words on this, so here it is:

If you don’t have a security architecture in place for your organization that does the above 5 things, you’re letting the inmates run the asylum.

And there’s NO WAY IN HELL you will ever run an effective security program.

And your board and executive team will never have a good picture of what you do for them.

And you’ll be struggling to not let the door hit you an the ass on the way out the door when something terrible happens on your watch.

Psssst…wanna fix it?

Then do these things right now:

  1. Go to this link: https://archistry.com/go/SecurityLeader
  2. Scroll all the way down to the bottom of the page, and click the BIG YELLOW BUTTON
  3. Let’s talk about how to get you started TODAY building the security program you know you need backed by the security architecture you must have

See you soon,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Business Alignment, Incident Management, Risk Exposure, Risk Governance, Risk Ownership, Security Architecture, Security Posture, Stakeholder Engagement, Threat Management, Triage

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.