Effective enterprise security architecture always starts at the top. The first step is understanding the business strategy and requirements, and enterprise risk concerns. This will drive the cyber strategy and requirements. For example, the Covid-19 pandemic drove businesses to adopt remote working strategies. As a result, cyber teams had to adopt equivalent strategies such as Zero Trust as they are no longer securing a ‘trusted digital perimeter network’. Another key outcome from this step is defining and building the key metrics that can be used to track and report the effectiveness of the cyber strategy.
The second step involves identifying security services that will enable the cyber strategy. This is generally realised by:
- Adopting a cyber controls framework (such as NIST Cybersecurity Framework), which will help identify the various required cyber capabilities. As part of this, a common controls framework – that maps compliance requirements across the various regulations, laws, and certifications the organisation is subject to – can be established to help cyber and other teams to understand and manage risk and compliance obligations
- Writing technical strategies for the identified capabilities, including an execution roadmap such as a network security strategy, identity and access management strategy
The third step is identifying the security mechanisms to implement for the identified cyber capabilities. At a high level, this is generally achieved through vendor comparisons across a set of identified functionality or features included in the technical strategies. Once a particular security mechanism is identified as the right fit, detailed design architecture is developed to underpin implementation and handoff to operational teams. All this must be supported by an effective governance, operating model, and cross-team collaboration across the management and implementation layers.
Adoption and execution of the above steps will establish the justification (i.e. ‘why do I need it?’ and completeness or traceability (i.e. ‘what business requirement do I need it for?’) of security capabilities and mechanisms.