Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / The Organizational Governance Mapper 9000

December 3, 2019

The Organizational Governance Mapper 9000

One of the shows my kids like to watch is Rusty Rivets, where Rusty and his friend Ruby and their team of robots create all kinds of crazy machines out of recycled parts to solve problems (and most of the time, problems they’ve inadvertently created for themselves).

For example, Rusty and Ruby get his great idea to tie a bunch of balloons together so that they can go for a ride—just like in a hot air balloon, and complete with an observation basket. Unfortunately, while they were off collecting the last bits of gear, their troublesome friend Liam gets in and accidentally sets off on an uncontrolled adventure on his own.

After assessing the situation, Rusty and Ruby decide that the best way to rescue Liam is, naturally, to pop some of the individual balloons so he’ll float gently to the ground. Their solution?

“Let’s combine it and design it!” as they say.

They take a tennis ball serving machine, Ruby’s vehicle chassis and a pair of caterpillar tracks they just happened to have lying around, result in…

The All-Terrain, Balloon Blaster 3000!

Which, after a few false starts, succeeds in rescuing their friend.

Now, one of the problems we face as security architects in particular is that we’re forced to solve problems our organizations may have inadvertently created for themselves based on either unclear implications to the decisions our customers make…

…or simply the fact that the way decisions are actually made isn’t often the same as the way we think they should be made, and which are (un)helpfully documented in reams of RACIs.

What we really need to be able to find are the real relationships and implications of the decisions the organization makes about how it “does its thing” without getting bogged down and overwhelmed in the details of security policies, controls and project documentation.

Fortunately, our security architecture scrapyard has a few neat parts lying around, like attributes, domains and relationships. All we need to do is a bit of “combining and designing” of our own so that we end up with a repeatable process for focusing our security efforts in the right place.

That’s right, we need The Organizational Governance Mapper 9000!

Lucky for you, you don’t have to figure out this “combining and designing” thing all by yourself, and you don’t even need your own team of Rusty, Ruby and the robots either.

All you really need is the information in the soon-to-be-shipped print edition of the Security Sanity™ newsletter that talks about all the inner workings and steps to untangle organizational decisions, relationships – and yes, the dreaded RACI chart – into something you can actually use as the basis of your security solutions.

Now, you might be thinking to yourself, “But we already have security governance.” And yeah, you probably do. But how does that illustrate the individual security requirements and priorities you need to demonstrate for each project?

Or, you might say to yourself, “I don’t need to understand governance to do architecture.” Um…nope. Architecture is about the structure of systems to manage the element interactions and information flows to deliver some kind of useful outcome. You can’t separate the two.

Or, you might (shudder) say, we have our security governance and interactions all mapped out in a framework, we follow industry best practices, and we have the RACIs to prove it.

*sigh*

All I can say to that is, if you do, congratulations! You’re in the distinct minority. However, I’d challenge you on whether your frameworks are doing the same thing I’m talking about and give you the potential for the n-way traceability required to really justify the value of your security activities every day.

Maybe they do. Maybe they don’t.

If you want to get my take on architecture, governance and the way it all fits together – along with some practical guidance to get it done without your head exploding – then get thee on over to this link:

https://securitysanity.com

Because at the end of the month, the velvet rope is closed, and the two big bruisers at the door won’t let you in to this holiday party, no matter what you aren’t wearing or how much cash you’re prepared to splash.

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Governance, RACI, Security Architecture, Security Decisions, Security Governance

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.