Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Eating your security requirements

September 25, 2019

Eating your security requirements

Ok, I get it. The whole concept of Security Requirements Engineering might be just like that old Life cereal commercial I grew up with. You might remember, if you’re old like me, but there’s these two brothers, and they have a bowl of cereal.

One says to the other, “What’s that?”

The other looks at him and said, “I dunno. It’s supposed to be healthy.” He shoves it towards his brother, “You try it!”

“No, you try it!” says the other brother, as they push the bowl back and forth.

Finally, one of the gets the bright idea to give it to his 4yo brother. “Let’s get Mikey to try it. He hates everything.”

And, lo and behold, Mikey likes it.

Now, I’m not saying that if you’re not convinced about the whole RE thing beyond the basics of Requirements -> Security Drivers -> Attributes and Domains, what’s in the forthcoming October issue about the rest of the RE story is going to have you lapping up Life cereal like it’s going out of style…

…but it just might help you do a bit better in making sure you can isolate the impact of change and make sure you can easily track down the right customers to get their stamp of approval—not to mention leveraging all those extra touchpoints to build your credibility and reputation.

What’s really interesting about it is that if you stand back far enough, and you squint…just so…there’s a bit more to it and how it fits in with SABSA® than you might’ve initially expected.

Most of the time, we don’t do those things we know we should because either we don’t believe they’re valuable or we think they’re annoying, too hard or even boring. But at the end of the day, if we want to get the best possible results, we know we’ve gotta eat our vegetables…

…we know we’ve gotta get off the couch

…we know we’ve gotta quit poisoning ourselves.

It’s just the way it is.

To explore the impact and challenges of good and bad RE in a security context, make sure you subscribe to the Security Sanity™ print newsletter before the October edition goes to the printer in less than a week.

Yes, it’s eating your vegetables,

and no, you might not think it’s sexy…

but it’s something that’s still gotta be done if you want everything to hang together…

…and you want the best chance of delivering the mission and purpose of security to keep the organization as safe as possible while moving as fast as It thinks it needs to go.

Here’s the link: https://securitysanity.com

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Agile Security, Requirements Engineering, SABSA, Security Requirements

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.