Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Cybersecurity measurement lessons from a famous French chef

September 18, 2019

Cybersecurity measurement lessons from a famous French chef

This weekend, I had a problem. And that problem was a hungry family, a beautiful roast and how to not screw it up.

Now you might remember that I like to cook, and I’m interested in learning how to do things properly. So, that means I like to get optimal results when I’m cooking anything—even, in this case, when I couldn’t remember the last time I’d actually made a roast.

One method of cooking it that is used quite a lot is the time per kg or pound approach. So you’ll find certain calculations in cookbooks that say if you have a 3lb roast, you cook it for X minutes, and it’ll be perfect!

…right.

It’s rarely that easy (pun intended).

And in this particular case, another problem I had was that the package for said roast was well thrown away, and, of course, the batteries on the kitchen scale were dead. Either way, it meant any kind of cooking ratio based on time was out the window.

Did I mention that I was also trying to do something else at the same time? So that also ruled out checking it incessantly to make sure it wasn’t burning, so I could jerk it out of the oven in the nick of time without ending up with a shriveled piece of leather.

Fortunately, one of the books on the shelf is Pépin’s New Complete Techniques (I actually like the old one better, but I gave it away thinking I could just easily buy it again…wrong).

And in it, he overtly poo-poo’s the time-based approach to trying to cook a roast because the cooking time varies on the:

  1. Size of the roast
  2. The cut of the roast (different tissues, you see)
  3. The temperature of the oven

So he gives the one key measurement technique that *always* works: you poke it with your finger.

Yep. The precision instrument of touch and experience wins the day.

But you say, how do I recognize what’s right?

It’s based on the “spring” of the roast when you touch it. If it gives a lot and feels soft and mushy, then it’s going to be pretty rare and underdone. If it’s soft with some bounce, it’s going to be rare. If it’s hard and springy, it’s going to be medium, and if it feels hard with no bounce, it’s going to be well done.

And, you know what, it works! That, and the other piece of critical advice is to let it rest for 5-10 min so it’s evenly cooked and not raw in the middle and dry around the edges.

Even I could do it, and get it right on the first go too!

What’s this have to do with cybersecurity measurement?

Quite a lot, actually.

What’s the objective we’re trying to achieve?

A desired level of “doneness” acceptable to the family.

What are we measuring?

The spring of the meat, which is directly related to the objective we care about. It’s impossible to separate the two things: the “spring” is directly proportional to the level of doneness, and we have a metric that tells us how they relate.

What didn’t we measure?

Time as a proxy for doneness.

Why?

Because from the description, and thinking about it for a minute, there’s no direct correlation between the two given the number of variables we have to work with. So trying to measure two independent variables and hoping for some magical relationship between them is clearly a recipe for disaster (you see what I did there, right?).

Now think for a minute…

Here’s the scenario. In the dining room, we have the owners of the objective, the family. And they express their preference for a level of quality and a certain set of characteristics for what we’re supposed to build.

They’re the customer, and they’ve given us a requirement.

And in the kitchen, with the specific roast in question, we have an oven, which we can directly control (to a point), we have time, which we can measure, and we have a measurement approach which is touch the meat and observe the reaction so we can compare it to the measurement scale established by the metric we’re using.

So what did I do?

Set a timer for a specified interval to trigger the measurement of the environment. Compared the measurement to the scale of my metric, and then made a decision about what to do next to achieve my objective.

Fortunately the approach worked, and the roast was perfect.

But what I really did was I had a fully-engineered set of requirements from the business customer down to the lowest levels of the operational implementation that all had to fit together in a system specifically designed to achieve the value the customer wanted.

That doesn’t happen by accident…and yet, that’s what happens too often in security programs. Requirements don’t get translated into a complete system that will allow them to be measured, reported and ultimately allow the course corrections required to have the best chance of success.

It’s all kinda random…or bad agile-ized…or islands of effort with the messages put in the bottle, tossed into the ocean and hoping that they’ll be delivered in time to influence the outcome.

Requirements engineering is a system to build systems, and as a system, it means it has a number of parts.

If you want to really know how to make sure all those messages get delivered all the way through from requirement to value in the best way possible,

…then you’d better make sure you get the upcoming October issue of the print Security Sanity™ newsletter. It’s how you make sure your customers don’t go hungry, start to riot and fill the streets with shouts of “Off with their heads!”

To subscribe before the deadline, go here: https://securitysanity.com

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Agile Security, Cybersecurity, Measurement, Metrics, Requirements Engineering

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.