jan-karel.com
Home / Security Measures / Reference & Architecture / Security Architecture Principles

Security Architecture Principles

Security Architecture Principles

Security Architecture Principles

From Framework to Practice

A reference chapter only has value when teams can directly use it to plan, design, and deliver.

In Security Architecture Principles, the goal is to document choices that teams can execute consistently and repeatably.

This keeps this chapter from being theory and makes it a usable compass for consistent execution.

Immediate measures (15 minutes)

Why this matters

The core of Security Architecture Principles is risk reduction in practice. Technical context supports the choice of measures, but implementation and assurance are central.

Why architecture makes the difference

Most incidents don't arise from a missing checkbox, but from structural design choices:

  • too much implicit trust between systems;
  • overly broad network access;
  • identity without clear boundaries;
  • observability added only after production.

Architecture reduces risk upfront. Hardening after the fact is more expensive and less effective.

Core Principles

1. Minimize Trust

Trust no network segment, workload, or identity without explicit validation.
Apply with:

  • strong authentication between services;
  • token audience/issuer validation;
  • explicit policy enforcement points.

2. Least Privilege by Default

Design permissions from deny by default.
Apply with:

  • scoped service accounts;
  • role separation;
  • time-bound privilege elevation.

3. Segmentation as a Design Primitive

Segmentation is not a network feature but an architecture choice.
Apply with:

  • blast-radius zones;
  • management-plane separation;
  • separate trust zones for third-party integrations.

4. Assume Breach

Assume that a control will fail.
Apply with:

  • detection of lateral movement;
  • break-glass procedures;
  • recovery paths that are periodically tested.

5. Secure by Automation

What is not automated will degrade.
Apply with:

  • policy-as-code;
  • configuration checks in CI/CD;
  • drift detection in runtime.

Architecture view per layer

Layer Design question Minimum security requirement
Identity Who may do what and when? Federation, MFA, JIT/JEA, lifecycle controls
Network Which paths exist? Segmentation + deny-by-default + egress governance
Compute Where does code run with which privileges? Hardened baselines, signed workloads, isolation
Data Where is sensitive data and who can access it? Encryption, key management, data classification
Control plane Who manages infra and policies? Separate management path, auditability, minimal privileges
Detection How do you spot abuse quickly? Centralized logging, detection rules, triage path

Architecture anti-patterns

  1. Flat network with "internal trust"
  2. Shared admin accounts
  3. Production and management on the same path
  4. Secrets in code, chat, or configuration files
  5. No threat model for critical flows

If you see any of these patterns, you are dealing with a structural risk rather than an incidental risk.

Decision framework for architects

Use for every design decision:

  1. What is the asset to be protected?
  2. What is the expected attacker (capability, motivation)?
  3. What is the impact of compromise (CIA + business)?
  4. Which control reduces risk the most per unit of complexity?
  5. How do I demonstrate effectiveness (metrics, tests, logs)?

Architecture Definition of Done (security)

An architecture change is only "done" when:

Summary

Security architecture translates risk into structural design choices. By designing with zero trust, segmentation, least privilege, and demonstrable detection, you prevent security from becoming a series of loose band-aids.

Op de hoogte blijven?

Ontvang maandelijks cybersecurity-inzichten in je inbox.

← Reference & Architecture ← Home