Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Putting your data flow diagrams out to pasture…for good

September 8, 2023

Putting your data flow diagrams out to pasture…for good

Image of Anja on Pixabay

May 31, 2020

If there was a popularity contest among all artifacts you might happen to unearth if you went digging for some glimpses of the architecture in your organization, the data flow diagram (DFD) would probably be the star of the High School football team, driving the red-orange Camaro with the T-tops, and dating the captain of the cheerleading squad. Because, like High School football stars, cheerleaders and Camaros in America, the DFDs are everywhere it seems.

And especially if you start talking about cybersecurity in the context of the modern, agile CI/CD delivery teams, you’re probably going to find at least traces of them rubbed out on the whiteboards of offices everywhere—even hanging around longer than the germs of COVID-19 after the place has been covered in industrial-grade disinfectant.

I get it. It  seems like a really great idea to build up a layered diagram that helps people focus on the communications and connections in an ecosystem, because that’s how things really happen. Information is exchanged along those connections, each node plays its part – even the ones with the pom-poms – and, naturally, if you want to try and corrupt the nodes, a good strategy is to try and unduly influence their view of the world or drive a 40’ big-rig through the doggie door and just take over the place, leaving all the subtleties to the wanna-be script kiddies.

However, the titillating temptation of building the “one diagram to rule them all” generally fails to deliver in the long run. Sure, there are true stories how a DFD put on ice between the Mesozoic Era and today informed the security control decisions of a re-implementation of said system with more modern technologies…

…and Microsoft  even has a tool  to automatically build them for you, so, if Microsoft does it – not to mention makes it easy to automate – you can bet development teams out there are going to use it, whether they really know why or how, just because it’s there.

I’m not saying they can’t be useful. And I’m certainly not saying that I can’t read them…or use them…

…or even run them through the View-O-Matic to slice and dice them into  something that I feel is far, far more useful in the long run from a security perspective, not to mention ending up with a better, overall architecture artifact to boot.

Meaning…the ol’ DFD racehorse has run his races, brought home the trophies, and can now spend his days chasing fillies and frolicking with the butterflies in the lush, grassy pastures of retirement.

I actually wasn’t going to go there with the June issue of the print, delivered-to-your-door Security Sanity™ newsletter when I’d  started to map out how to say what I wanted to say…

…but then a couple of conversations with some of my coaching clients in the security leadership program made me think that maybe it was time to tackle this beast, because it highlights how we’re often abducted in our architecture sleep by the space aliens of complexity…

…before being returned slightly brainwashed about the most effective, efficient and easy-to-integrate tasks into a DevSec-sec-sec-secOp-op-opzzzzss delivery model.

You might not agree with me, and that’s totally fine. But you also probably won’t understand exactly what I’m talking about if you don’t manage to be subscribed in time to get the June issue. Because the time to do that is approaching more rapidly than even I would like, since I’m having to re-jig the content and structure of the issue at the last minute to cover what I want to cover.

If you haven’t already done it, and you’ve been sitting on the fence waiting for a butterfly to tickle your nose and give you the sign from the universe  as to whether or not it’s worth it…

…well, it probably isn’t. Because if it’s taken you this long to figure it out, it’ll probably take you even longer to read it and try to put it into practice—which pretty-much defeats the whole point of me going to the trouble to write the things the first  place.

But if you’re late to the party, and you’re only now digging this email out of your spam folder…AND you’re ready to get serious about putting the “architecture” into your security architecture practice, then you’ve still just about 8 hours or so before the deadline to subscribe in time to get the June issue.

But don’t dilly-dally around if you want in, because who knows what kinds of gremlin hiccups might happen between now and then with the interwebs, shopping carts  and payment processors.

If you want in, and you haven’t yet done it, then this is the link that will lead your DFDs to a quiet and retiring – yet long and still rewarding – life on the greener, grassier side of the fence:

https://securitysanity.com

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

 

Article by Andrew Townley / Archistry Daily / Cybersecurity, Professional Development, Security Architecture, Software Architects, Software Engineer

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.