Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / All for the want of architecture

April 1, 2020

All for the want of architecture

There’s a quote by a long-dead Unitarian minister named William Alger that gives us a good introduction to today’s security architecture sin: wrath. It goes:

“Men often make up in wrath what they want in reason.”

And, as far as we’re concerned, you can quite easily replace the word “reason” in Alger’s quote with the word “architecture,” because in my experience, pretty-much every time security folks get their knickers in a twist about those “evil business users” doing something they think is wrong…

…it eventually boils down to a lack of security architecture that enables them to do what they need to do the “right” way, and in conformance to the holy security policies of the organization.

I mean, at times, and due to the vehemence of security in saying, “No, you can’t do that, it’s against the security policy!” it’s almost like…the Spanish Inquisition!

[NOBODY expects the Spanish Inquisition! Our two weapons are fear and surprise…and ruthless efficiency—three! Our THREE weapons are…]

But still…we get angry at the business, and we tend to forget that we’re actually working for them rather than them being subjects to our merciful and benevolent rule.

Now, sometimes, yes…I will admit, we’ve done our job, we’ve aligned with the business, and we’ve provided a set of flexible security policies and control implementations that should very well support the current and expected future needs of the organization…

…and they still can’t follow directions.

Yeah, it’s frustrating. And, the more overworked and stressed-out we are doing a bunch of other things than architecture work, the more likely that frustration will spiral into downright wrath and eventual loss of respect.

If (or when) that happens, it’s pretty-much game over for security as an enabler of the business, and the clock starts ticking until the inevitable major security incident that makes headlines. Because, if you treat your customers with contempt and anger instead of trying to deliver value, they’re going to start to take great delight in circumventing your security guidance any way they can.

[NOBODY expects the Shadow IT Solution! Our three weapons are easy, cheap, and functionality we actually wanted…and getting it done fast—four! Our FOUR weapons are…]

Now, I’m not suggesting security should wiggle like a wet noodle.

What I’m saying is that security should be firm.

Al dente. Not over-cooked.

But we should be firm in all the right ways and in all the right places.

And if we’re want to get angry about people not following the rules, then we’d better start taking a long hard look at those rules and how they’re actually being created—not start shooting the messengers and blaming them for our frustration.

Fortunately, there’s a solution to this particular security architecture vice too, and it’s one that I’ll cover in the upcoming pages of the March issue of the print Security Sanity™ newsletter that will ship shortly after the beginning of the month.

However, you won’t get this helpful harbinger of the virtuous practices that will specifically address each of these seven deadly security architecture sins you might be unwittingly undertaking unless you’ve subscribed before Saturday’s deadline using this link:

https://securitysanity.com

To hopefully dispel any potential confusion on your part about whether you’re already subscribed since you’re reading this email, unless you’ve gone to the above URL, clicked the GINORMOUS bright yellow “Subscribe NOW!” button, and successfully provided your credit card details for the recurring fee of the admittedly expensive $97 monthly subscription fee…

…you ain’t gonna get a pretty white envelope delivered to your doorstep every month containing your monthly fix of sanity in our crazy world of the modern security program.

And maybe that’s ok. Or maybe you’ll be sorry you’ve missed out on the insights and answers you can apply immediately after devouring each delectable leaf.

Only you know the answer.

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / 7 Deadly Security Sins, Agile Security, Security Architecture

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.