Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Is your SABSA stuck in the mud?

July 18, 2019

Is your SABSA stuck in the mud?

During the research I did last year reaching out to SABSA practitioners, one of the things that kept coming up over and over again was that people were having a really hard time trying to get started with SABSA in their own environments.

And this isn’t just with people who take the course and try to “fit it in” around the edges of what they’re trying to do. It’s also a very real problem I face every time I’m working with someone directly who wholeheartedly believes in the value of SABSA, but they just can’t get  very far with it.

Despite the guidance of “use your own definitions” and “define your own attributes” you get during foundation, the reality is that most people don’t. They pick the ones from the handouts and try to apply them to their environments.

…or the opposite is true and you spend loads of time trying to build the “perfect” Attributes Profile, and then by that time, the organization’s lost interest, and even you might be burnt out and have forgotten the value you were hoping to get out of the  exercise in the first place. In one extreme  case I remember hearing about, someone worked 2 years on just attributes!

So here’s the thing about security architecture, SABSA or otherwise:

Architecture is there to help people make decisions, both about priorities and about what to do next. And no, they aren’t quite the same thing.

So, the measure of the value of the architecture is really a combination of two things:

  1. the time it takes before you have  “enough” architecture to support decisions that guide the work that the security team does, and
  2. the quality of the decisions you’re able to make based on the architecture.

So, it’s clear that taking a long time to “map the world”  isn’t going to fare very well in terms of those two metrics.

Now, last year at COSAC, I tried to help people understand  that it was possible, and in fact recommended, that you should apply SABSA in an agile manner. And the best way to do this is in terms of well-defined iterations of scope you can control.

However, this is good as far as it goes, but the next questions are immediately about  “what should go into an iteration’s scope?” and “what’s too big or too small?”

And, at the time, I didn’t really have a good answer for that. I mean, given a particular scenario or a particular environment, I had no problem answering. I just didn’t know how I did it.

Now I do.

And that system is what the August newsletter is all about. It is a system and a set of 7 principles that will make sure you are always focused on the right things and gives you a framework in which to ask the right questions to make those decisions.

But that only goes so far as well. It’s still not enough to get people who haven’t really practiced SABSA the boost they need to start getting value from it—and see that value quickly.

So the second thing I realized was that those recurring patterns I was talking about before were the key. Now, if you were at COSAC last year, or we’ve worked together directly, you’ve seen these. It’s a set of domains and attributes that I use as a starting point in all the  architecture work I do.

However, they’re still somewhat complicated, and you still need to have a pretty good understanding of how things fit together to use them.

There needed to be an even more essential way to help people build SABSA security architectures “by happy accident” and without getting lost in all of the powerful, but potentially overwhelming, goodness that is the SABSA methodology in full.

Now, I know John and David aren’t going to like this approach very much because in a way, it’s a “reference architecture”, and that goes against what they recommend: that you build the attributes and domains according to your own understanding of your organization, because every organization is different. And, actually, I still agree with that.

But it’s a pretty steep hill to climb if you’ve never seen or used what you’re trying to build…

…and you’re trying to do it on the front lines of an understaffed and unappreciated security team.

So I put my stuff through the strainer again and came up with what I think are the most essential ways of looking at your organization that you need to think about when you build a security architecture. It’s like a skeleton.

It gives you an  outline of where you’re supposed to go, but without being too prescriptive about what goes in the middle. The point of this was making sure it’s something you can literally pick up and transform the shape of your security architecture in as little as a week, depending on how much time you can allocate.

That’s why 25% of the August newsletter defines a set of baseline perspectives to give you a working domain  framework out of the gate. That’s 10 pages of domains, ready to go. Today.

But don’t panic, there’s only 3 perspectives—and a whole lot of commonality between them.

The most important thing is that the whole thing fits together as a system: the principles, practices and the baseline perspectives you need to truly deliver Agile Security in your organization.

And that’s also why I’m never going to make this issue available again if I do ever decide to sell back issues. It’s that important, and, as I said yesterday, in my super-biased opinion, this is the best work I’ve ever done in my entire career to date.

So if you want to make sure you get it and can transform your security architecture in August, subscribe here before it goes to the printer at the end of the month:

https://securitysanity.com

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

P.S. Here’s something you can do if you liked today’s post: you can sign up for those daily emails that annoying pop-up keeps asking you about. Or, if you want to know more about what you’re going to get if you do and how it works, then just go knock on the front door: https://archistry.com and you’ll get the whole deal.

Or…you can just keep reading the blog, or ignore me and Archistry all together. I’m good either way.

Article by Andrew Townley / Archistry Daily / Agile SABSA, Agile Security, COSAC, SABSA, SABSA Iterations

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.