Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / The ultimate security song to keep you focused on what you’re doing

May 28, 2024

The ultimate security song to keep you focused on what you’re doing

“Come on tell me who are you
Oh, I really wanna know”

If there was ever one song recorded that captured the essence of what we do as security, I’d have to give it to the classic “Who Are You” by the Who—especially after the deep dive into thinking about authentication and access control I did recently for the June newsletter I was talking about last week. It’s a song I’ve been listening to for years—well before the 1988 release of “Who’s Better, Who’s Best” that I bought around that time.

One of the things you quickly learn when you’re first exposed to SABSA is that there’s a lot more to security than the traditional CIA triad you focus on so much with the CISSP exam. Sure, those 3 things are important – and there’s generally even attributes defined for them – but at the end of the day, security comes down to decisions you make about who does what, to whom, and how often. And it’s all implemented in terms of some binary decisions based on who you claim to be, how much I believe you, and, if I’m so inclined to believe your claim, whether you’re actually allowed to drink the milk out of the big jug in the refrigerator or not.

In our house, the answer is a flat-out no—no matter who you are. But in your house, the answer may well differ.

And it differs because different things are important to you…wait for it…

…based on who you are…

…and who the other person (or thing acting on behalf of some other person) claims to be.

That’s the context of security that so many organizations I’ve encountered tend to gloss over. Maybe it’s because they don’t know how to ask. Maybe it’s because they know what to ask, but they can’t get anyone to meet with them.

Or maybe it’s because, in their organization, they have a compliance and/or control-based view of security that places more emphasis of demonstrating you’ve turned your controls up to 11 than it does on ensuring that the controls you actually do put in place are enabling and protecting the business in meaningful ways.

It’s that last bit that is why there’s more than 3 attributes in a SABSA security architecture, because there’s potentially a bunch of different things you’re going to need to measure and report to the people you support in order to earn the credibility and trust that enables security to transcend the traditional labels of the Department of No and being seen as simply the Policy Enforcement Police…

…which most definitely gives a whole other spin on getting a PEP talk, now doesn’t it?

But maybe you don’t believe me. So let’s take a walk together through some attributes. Generally, there’s a set of between 50 or 60 that’ve come up regularly enough in my own security architecture work for me to isolate and establish consistent definitions. And, depending on the threat and control frameworks you use, you might have many more.

For example, my latest analysis of the CIS20 common controls defined 47 unique attributes, 27 attributes impacted or implied by VERIS and another 48 attributes extracted from the recent CSA Enterprise Architecture analysis I did for April’s newsletter about cloud security.

However, what matters most isn’t the number of attributes you might identify—it’s how you define and use them within your security architecture.

It doesn’t change the fact that what you need to identify as security is to answer the “who are you?” question, though. The focus of the question just changes the more complex the nature of the capability you’re trying to measure and the further away from the CIA triad you get.

What’s an attribute like “Ethical” got to do with access control, you might ask?

In this case, it’s down to clearly identifying a set of whos and the specific access control decisions that need to be made to successfully deliver it:

  • Who decides the definition of “ethical” behavior?
  • Who’s going to enforce that definition?
  • Who’s going to define the acceptable evidence of whether any instance of conduct fits the rules?
  • And, ultimately, are you the who that allows you to actually do what you’re trying to do?

Because each one of those ultimately depends on a well-established access control system within the scope associated with the capability itself.

The thing is, we just don’t tend to think about it that way.

Which brings me to another question I tend to get asked from time to time:

Why do you offer a coaching and mentoring program about security leadership instead of more traditional “security consulting” types of services?

The answer is, well, Archistry does offer, from time to time, some more traditional security consulting and “done for you” types of services. But what I’ve found over more than a few years of doing that kind of work is that…

…if you don’t change or expand the way an organization’s security team fundamentally thinks about the job they’ve been hired to do first…

…then any “security work” done by anyone – me, you, or any other company you might think of – is generally only a short term solution (at best)…or quickly forgotten or replaced (at worst).

So the epiphany I had at some stage was that the real value I can add to helping you address your security problems is brining in all the myriad experience I’ve had doing it wrong, seeing it being done wrong…

…and ultimately figuring out what tends to work more often then not…

…and then helping you figure out the best way to leverage that knowledge and experience yourself, in whatever role you have, and trying to tackle the problems that stare at you with red, glowing eyes from the ceiling at night when you just can’t seem to sleep.

Because that’s how lasting change happens. It has to happen from the inside. It can’t be something someone does for you—although, clearly there’s a time and a place for that too.

But, most of the time, I’m happy to let someone else worry about that stuff.

So if you’re not getting the results you want in your security program, and you’ve been through the exercise of systematically changing the people, the processes and the technology you use…

…maybe it’s time to think a bit differently about the problem you’re trying to solve.

And maybe I can help you do just that as part of our Effective Security Leadership coaching program.

If you’d like to talk about it, you can set something up using the big, yellow button at the bottom of this page, right here:

https://securityleadershipcoaching.com

But…if it’s not for you, then that’s ok too. It’s not for everyone, nor is it for every organization. You’ve gotta be ready…

…and you’ve gotta be committed to making a change—even if that change is just in the way you, as an individual, decide to tackle the job you do.

If you’re not, then it’s going to be a disastrous waste of your money and both our time.

“I really wanna know
Oh, I really wanna know
Come on tell me who are you, you, you, you”

And who do you want to be?

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Agile Security, Leadership, SABSA, Security Customers, Stakeholder Engagement

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.