Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Breaking through the “domain” barrier with security architecture

April 18, 2023

Breaking through the “domain” barrier with security architecture

Image of Dorothe on Pixabay

May 18, 2020

Let’s get straight to the point: if you approach security with a “domain” mindset, then you’re never actually going to be successful in protecting your organization—nor will you ever, not in a million-billion years, be able to demonstrate you’re actually helping them get things done they want to do.

And, those quotes around “domain” were intentional, because there’s the dictionary definition of the world that applies for 99% of the people, and that’s this one:

“A specified sphere of activity or knowledge.”

Which sounds great, and it’s what (ISC)2 means when they talk about the 8 “domains” of the content of the CISSP certification…it’s what TOGAF means when it talks about “domain” architects…

…but it MUST NOT be what a practicing security architect talks about when they use the word domain. Because you know what else that definition describes?

Silos.

The kind with walls built of “Oh, but I don’t need to understand how that works. It’s not part of my domain.”

The kind that make it easy to isolate ourselves and engage in narcissistic navel-gazing about how many exploits can dance on the header of a wayward TCP packet.

The kind that virtually GUARANTEES security will forever be consigned to the chains of the Policy Police, the Department of No, and the Institute of Business Prevention.

Why?

Because, if it ain’t in our “domain”, then why should we give a rat-faced phuck about it? Business people? Lusers. Business Models. Don’t care. Customer experience? Serves them right if they want to post pictures of their passwords and keycodes, geotagged to the exact location of where they’re supposed to be used “just so they don’t forget them.”

Extreme?

Maybe. However, scratch – even just the thinest molecule – of the surface of some hard-core security people, and they wear the “domain” boundary of Us vs. Them as a badge of honor.

It just doesn’t help. Because if we want to be successful in security, it doesn’t mean stopping every possible attack and applying every control on some “blessed” list of what Dr. InfoSec says is the right approach to ensure our servers are flossed and our networks are brushed every night before we go to bed.

Being successful in security is about keeping people safe…WHILE they’re trying to accomplish something that matters to THEM.

It doesn’t matter if we think it’s stupid, fluffy, irrelevant or even downright dangerous. We don’t get paid for our perspectives  on the validity of our customers’ objectives.

What we get paid to do is keep them safe while they’re doing it—whatever IT happens to be.

And after 25 years of a varied and rather interesting professional career, I’ve seen hard evidence over and over again that proves the only hope we really have of keeping our security customers safe AND enabling them to be successful at the same time…

…is by creating a security program around a robust security architecture that is built to enable the business based on a rational, prioritized view of managing the risks that are most likely to keep them from getting it done.

But, unfortunately, that’s not what we tend to do. If we even use the words “security architecture” at all, we’re generally talking about only the slimmest sliver of what it really is—thinking that it’s the end-all, be-all definition that really doesn’t do much except collect a bunch of boxes and lines that nobody ever really uses other than to ensure payment milestones are promptly processed.

There’s more to it. There has to be, because, it’s clear from just trying to do our day-to-day jobs that what we’re doing just isn’t really good enough.

It’s not for lack of trying. It’s just we don’t see the real problems we need to solve that can potentially change everything about the overall effectiveness and the workload of our entire security team.

If you’re not happy doing what you’re doing, then I have something you might want to consider: joining the next cohort of Archistry’s flagship Building Effective Security Architectures hybrid online and live learning experience. Because what you’ll learn is the real perspective you should have on security architecture…

…how to deliver it in small, easy to communicate and value-laden chunks…

…all while using the widely-recognized, industry-leading SABSA methodology…

…by focusing on what’s really important…

…so you don’t get overwhelmed, lost, frustrated and end up effectively with a set of security blue balls because you just don’t know how to put it all into action so it actually delivers what it says on the tin.

If that’s you, the pre-registration period is now open until this Saturday, May 23rd at 11:59pm US/Eastern, giving you about 5 and a half days to get things in order so you can save $1,000 before the price goes up. To get in – and get the discount – get on over to this link, and get on the bus, Gus:

https://archistry.com/besa

Because real security architecture doesn’t build itself. It needs a real security architect to step up, take charge and make it happen.

Maybe that security architect should be you.

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Cybersecurity, Professional Development, Security Architecture, Software Architects, Software Engineer

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.