Security Architecture Principles
From Framework to Practice
A reference chapter only has value when teams can directly use it to plan, design, and deliver.
In Security Architecture Principles, the goal is to document choices that teams can execute consistently and repeatably.
This keeps this chapter from being theory and makes it a usable compass for consistent execution.
Immediate measures (15 minutes)
Why this matters
The core of Security Architecture Principles is risk reduction in practice. Technical context supports the choice of measures, but implementation and assurance are central.
Why architecture makes the difference
Most incidents don't arise from a missing checkbox, but from structural design choices:
- too much implicit trust between systems;
- overly broad network access;
- identity without clear boundaries;
- observability added only after production.
Architecture reduces risk upfront. Hardening after the fact is more expensive and less effective.
Core Principles
1. Minimize Trust
Trust no network segment, workload, or identity without explicit
validation.
Apply with:
- strong authentication between services;
- token audience/issuer validation;
- explicit policy enforcement points.
2. Least Privilege by Default
Design permissions from deny by default.
Apply with:
- scoped service accounts;
- role separation;
- time-bound privilege elevation.
3. Segmentation as a Design Primitive
Segmentation is not a network feature but an architecture choice.
Apply with:
- blast-radius zones;
- management-plane separation;
- separate trust zones for third-party integrations.
4. Assume Breach
Assume that a control will fail.
Apply with:
- detection of lateral movement;
- break-glass procedures;
- recovery paths that are periodically tested.
5. Secure by Automation
What is not automated will degrade.
Apply with:
- policy-as-code;
- configuration checks in CI/CD;
- drift detection in runtime.
Architecture view per layer
| Layer | Design question | Minimum security requirement |
|---|---|---|
| Identity | Who may do what and when? | Federation, MFA, JIT/JEA, lifecycle controls |
| Network | Which paths exist? | Segmentation + deny-by-default + egress governance |
| Compute | Where does code run with which privileges? | Hardened baselines, signed workloads, isolation |
| Data | Where is sensitive data and who can access it? | Encryption, key management, data classification |
| Control plane | Who manages infra and policies? | Separate management path, auditability, minimal privileges |
| Detection | How do you spot abuse quickly? | Centralized logging, detection rules, triage path |
Architecture anti-patterns
- Flat network with "internal trust"
- Shared admin accounts
- Production and management on the same path
- Secrets in code, chat, or configuration files
- No threat model for critical flows
If you see any of these patterns, you are dealing with a structural risk rather than an incidental risk.
Decision framework for architects
Use for every design decision:
- What is the asset to be protected?
- What is the expected attacker (capability, motivation)?
- What is the impact of compromise (CIA + business)?
- Which control reduces risk the most per unit of complexity?
- How do I demonstrate effectiveness (metrics, tests, logs)?
Architecture Definition of Done (security)
An architecture change is only "done" when:
Summary
Security architecture translates risk into structural design choices. By designing with zero trust, segmentation, least privilege, and demonstrable detection, you prevent security from becoming a series of loose band-aids.
Further reading in the knowledge base
These articles in the portal provide more background and practical context:
- Incident Response — when things go wrong
- Compliance — following rules without losing your mind
- Least Privilege — give people only what they need
- Patch management — the most boring thing that can save your life
- Backups — the most boring topic that can save your life
You need an account to access the knowledge base. Log in or register.
Related security measures
These articles provide additional context and depth: