Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Hey, don’t feel bad…even the “experts” don’t understand security architecture

February 25, 2019

Hey, don’t feel bad…even the “experts” don’t understand security architecture

I truly don’t know where to begin.

No, really. I don’t.

In the last 3 weeks, I’ve heard so many well-meaning but violently misguided takes on security architecture by otherwise intelligent people that, well…it actually left me a little stunned.

Let’s get the definition out of the way first. If “architecture” is “the complex or carefully designed structure of something” – to pick a simple version – then “security architecture” must be “the complex or carefully designed structure of security.”

But then, we get into the whole debate of what “security” actually means—which is also kinda funny since the reason nobody can define THAT is because it’s the “whatever it takes to make you confident that you’ll get what you want.”

…and that, my friend, is where we go so far beyond the apple cart we’re talking about hard cider.

Unpacking, in reverse order, security in the form of ye-old-tyme High School football cheer:

What do we want?

…to get what we want!

What do we want?

…a bunch of stuff the business wants to do that we don’t really understand!

What do we WANT?

WE want to help THE BUSINESS get what THEY want (whatever that is)!

Ok, so let’s change it up slightly:

Security architecture is “the complex or carefully designed structures intended to enable the organization to achieve its objectives.”

Now, let’s look at the “complex or carefully designed” bit.

What does that really mean?

Well, it’s complex because it’s a system of capabilities operating within the complex system of the organization it’s trying to protect as that organization operates within the complex system of the world around it.

So not one…not two…but THREE levels of complexity:

  1. the people, processes and technical security controls
  2. the people, processes and technology that both define the organization and give it life every day
  3. the external environment with which the organization interacts every day so it can provide some kind of value a “customer” cares about that enables them to solve a problem.

And that means “security” operates across, in and around all three of those, because each one has its own set of goals and objectives that need someone to run interference for them so that they have the best chance possible of being achieved.

Now, we unpack the “carefully designed structures” part.

What kind of structures are we talking about?

Well, first there are the different types of risks that might occur to get in the way of any one objective. We need to find them, classify them and put them in a box with a label made of masking tape and smeared sharpie ink.

Second there are the set of interconnections and relationships between the people who want those objectives; everyone that works for those people to help them make it happen; and the set of interconnections and relationships between those “hands” reaching through the organizational wall that touch the customers who keep the whole thing running.

Third there are the set of capabilities that enable, protect and ensure those interconnections and relationships are created, actually work the way they’re intended, report how well they’re working to the people that depend on them (on both ends, mind you…)

And a fourth type (and we’ll stop here) is the carefully designed structures that make sense of all those other carefully designed structures so that you can communicate to people that you have their back and they now have the best chance you can give them that they will get what they want.

Abstract? Absolutely.

Complex? You bet.

Technical? About 10%

Here’s something that might help.

Think about where you live…your house or your apartment. Now think about what your house, apartment or whatever actually does for you.

It gives you a place to eat. It gives you a place to cook. It gives you a place to sleep. It gives you a place to surf the Interwebs. And it gives you a place to poop (which might actually be one and the same as the latter…from time to time…).

And there’s a bunch of stuff that has to exist so you can eat, cook, sleep, surf and poop.

But those things aren’t the “architecture” of your place of residence.

The number and location of the bathrooms. Whether you can get to the bedroom in the dark after your midnight wee. How far away the sink is from the stove. Whether your neighbors can see you standing naked in front of the kitchen sink.

THAT, my friend, is the “architecture” we’re talking about.

Not the wires. Not the plumbing. Not the fridge. Not the stove. None of it.

“Architecture” is the way everything in your abode is organized to support the way you live.

And if you’re talking about “security architecture” you’re talking about why where you poop isn’t right next to where you eat or where you cook.

They’re separated so you don’t have to worry about dropping your eggs in the toilet.

They’re carefully designed so you can not have to worry about “architecture” and get on with your life.

They’re complex, because those decisions require careful consideration of the specific trade offs, assumptions and requirements that make a house different from a car…or an airplane and it ultimately delivers all those wonderful and clever technical gizmos it takes to work.

It should blend into the woodwork so you don’t realize it’s there.

And because of that, it should help you keep the organization safe.

Today, tomorrow and independently of whatever brand of tap and toilet you like most.

So how closely does your definition of security architecture reflect “the complex or carefully designed structures intended to enable the organization to achieve its objectives?”

How independent of individuals, tools or technology is it?

If it isn’t, the let’s get working together to fix it.

Start here: https://archistry.com/go/SecurityLeader

TGIF,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Definition, Security Architecture

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.