Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / I said…read the damn policy—or the puppy dies

January 30, 2020

I said…read the damn policy—or the puppy dies

I get it. I really do. The old saying of “You can lead a horse to water, but you can’t make him drink,” seems to be one of the most frustrating truths in security. I remember on one particular, highlight politicized, multi-vendor public sector project I was on, it was enough to literally make me have to walk around the building from time to time. Eventually, my take on it became…

“Oh…look at all the drown, dead horses lying around!” because no matter what you did – or how thirsty they were – they just wouldn’t pay attention.

It gets you to the point where you feel like one of those crazy super-villains in the movies breaking into someone’s kitchen, grabbing their cute and fuzzy, chocolate brown Labrador puppy, putting a gun to its head, demanding with wild, demanding eyes and spiky greasy hair:

“Read the policy—or the puppy gets it!!!”

Which, of course, doesn’t do great things to either:

  1. our credibility within the organization and especially with the people we’re supposed to be supporting and keeping safe; or
  2. their willingness to actually voluntarily read and be guided by said policies the next time they’re trying to run a project.

In fact, what we’re really teaching them to do – through negative reinforcement – is to avoid us at all costs, make sure we never get any money because of the trouble we cause, and lay out the red carpet to uncontrolled and unmanaged cloud IT service providers.

In short: it’s a real pisser.

But sometimes, as I know very well myself, it seems like it’s the only option we have open to us…

…or is it?

What if:

  • we could create security documentation people actually wanted to read (or, at least didn’t recoil in horror from as if it were a 3 meter black mamba looking them eye-to-eye);
  • we could eliminate the volume of security documentation so that our customers didn’t feel like we were dumping an entire, dusty, physical, leather-bound set of all 17 volumes of the Encyclopedia Britannica every time they “just wanted to access a website”; or even
  • we could actually avoid the whole security documentation question entirely by having the confidence the controls required for the solutions the organization needed were automatically being included in the infrastructure configurations (and had the monitoring and reporting capabilities in place to ensure this was so).

Well, maybe we can, and maybe we can’t. And I know for sure that without deeper knowledge of your organization’s business, your technology environment, your organization’s approach to risk and a whole host of things—including the security vendors and components you already have…

…I don’t have a hope in hell of doing it.

But you might—because you probably know all the things on the laundry list I just rattled off already. However, what you might not know is how to take all that information, organize it, prioritize it, model it and communicate it…

…in a way that gets the people you support ACTUALLY believing you’re on their side, and you’re working in their interests, not just your own.

And THAT means, you actually start getting things done.

You start getting your budget.

And you start getting the new team members you’ve been begging for for months…

…all without harming one soft, chocolate brown hair on the head of any puppy used in the writing of this email.

So if you don’t know how to do all those things, then this is precisely why I created the Building Effective Security Architectures education program—and it’s also why I made it 7 weeks long instead of a typical 3-5 day, in person “training jolly” where other people in your organization think you go to wine and dine on the company tab.

But you won’t know if it’ll work for you unless you’re part of the cohort, because no matter what I say, or what anyone else says about it, it ultimately comes down to whether you’re ready to do the work and develop practical skills in applying SABSA to develop truly business-driven security architectures that will even traceably show your DevOps infrastructure is aligned with the dusty, old and boring security policy that applies to the rest of the organization.

To find out, you’re going to need to visit this link and register for the next cohort starting the 24th of February:

https://archistry.com/besa.

Or, maybe the “puppy strategy” is your next best option…because sometimes, it’s all we’ve got left.

Either way…

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Agile Security, BESA, SABSA, Security Architecture, Security Policy, Stakeholder Engagement, Stakeholder Relationships

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.