Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Gimme 3 types…gimme 3 types, mister

September 24, 2019

Gimme 3 types…gimme 3 types, mister

Whether or not you’re cutting the rug with Linda Lou or shakin’ like a leaf on a tree, one thing you need to know about requirements if you’re going to have a hope of tryin’ to prove they’re the right ones you should be including into your security program is that there’s 3 types:

The first one is functional requirements. Now these are the ones most everyone knows at first glance, and they’re the main focus of most requirements exercises.

The second one is quality requirements. These are also referred to as the aptly un-descriptive “non-functional” requirements of whatever it is you’re trying to build or support.

And the third one is the constraint, which is…strangely enough, exactly what it says on the tin. These are what makes architecture architecture instead of pink fluffy clouds high in the sky where the rainbow-tailed unicorns frolic the day away.

Constraints drive architecture and design decisions, and they limit the scope of what you can and can’t do in trying to deliver or support those requirements.

So why am I telling you about this?

Well, first off, while you might understand requirements engineering in the general sense of systems development, but there are some twists on this when it comes to security that might trip you up. And its these same things that are also why your friendly, neighborhood BA might not be the bestest, tippy-top choice for engineering those security requirements after all.

Secondly, in terms of the priority of the requirements and their influence on the security controls in your organization, it’s almost the exact opposite of what they would be for systems development. Because the constraints and the quality requirements lead the way.

These are the ones that are most directly expressed in your “product” of security (which will have to remain a mystery for another day), and those functional requirements need to undergo a bit of massaging before they’re generally very useful from a security perspective.

So the question becomes: what does this mean to me, and how do I put it all together?

What it means is that there really is something to this whole RE lark after all, and the security requirements don’t just ooze up from the controls with blinking lights and vendor stickers on them. You need to turn the crank—but you need to turn the RIGHT crank…at the RIGHT time…so you get something useful you can point to, parade around and get everyone’s general consensus that these are, in fact, the droids you’re looking for.

How you put it all together requires you to understand how one system intermingles with another system inside the overall system of your organization. Because if you don’t, you’re going to make the same mistakes engineering teams have been making for over 30 years.

…but you don’t want to do that.

You want to have business-driven, traceable security programs that have their value so obvious it’s like they’re dancing on the table. You probably know the basics, but the basics aren’t enough to build credibility and trust with your customers.

If you want to know all the Wile E. Coyote ways you can ensure your security product is fit-for-purpose and you’re doing all the right things to earn that customer trust…

You might want to check out the upcoming October issue of the Security Sanity™ newsletter, where we do a bit of deep dive on the lesser-discussed parts of RE that will ultimately do more to make or break your security program than you might think.

In September you learned the techniques for effective stakeholder interviewing, so this month’s issue will ensure what you learn of your customers’ worlds is effectively poked, prodded and sometimes beaten into submission – delicately, of course – so you have the best chance possible of keeping your organization safe.

Here’s the link: https://securitysanity.com

The clock is ticking, however, because in exactly 7 days, it gets shipped out, and, just like that fellow with the hair colored yellow, you ain’t never gonna see it no more.

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Agile Security, Customer Trust, Requirements Engineering

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.