Skip to article frontmatterSkip to article content
Site not loading correctly?

This may be due to an incorrect BASE_URL configuration. See the MyST Documentation for reference.

To create a sustainable solution to reduce cyber security threats is to create a solution architecture. Within this architecture you design a solution that meets your functional requirements. But this architecture is also to match design the protection measurements needed based on your risk analysis.

The perfect solution to reduce security risks to zero does not exist. A security architecture assists in the process of optimising and managing your risks.

A good way to really speed up creating your solution architecture is of course to use this reference architecture as the basis.

A Security Architecture describes how security measurements are positioned. Measurements can be process related or be implemented by a security product such as a SIEM system.

Security Architecture: The Bridge Between “What” and “How”

Security Architecture lives in the tension between what we need to achieve and how we will actually achieve it. Security Architecture is the complex field between what and how.

whatvshow

Most architects and consultants focus almost exclusively on the what—the policies, controls, and compliance requirements. But architects who truly practice Security By Design never lose sight of the how.

Why? Because the how is what makes or breaks a secure architecture.

If a security control cannot be implemented simply, it will:

And that means security is not helped—it is harmed.

The aims of a good and simple security architecture are:

  1. ensure business continuity

  2. comply with legal requirements and

  3. to provide the organization with a competitive edge

Security Architecture Definition and key aspects

Security Architecture

A security architecture serves the goal to move from abstract security requirements to concrete technical implementations, while staying within governance guardrails.

1. The “Why & Constraints”

2. Architecture Building Blocks (ABBs)

High-level, technology-agnostic capabilities

Common ABBs are:

ABBs answer “what must the system do?” without specifying how.

3. Solution Building Blocks (SBBs)

Concrete, implementable technologies or patterns

Each ABB maps to one or more SBBs: Some example SBBs are:

4. Outcome

(new) product / process / service

The entire flow delivers a secure-by-design asset, not just a checklist.

Here’s an improved version of your UK English text, refined for clarity, professional tone, and pedagogical flow in a “Mastering Security By Design” course.

Key learning points

Steps for creating a security architecture using Security by Design practices

  1. Define scope, goals and risk assessment
    Establish the business context, assets, and high-level risk appetite.

  2. Determine (and actively elicit) requirements

    • Create a threat model (e.g., STRIDE, LINDDUN).

    • Apply a security model (e.g., Zero Trust, least privilege).

    • Use design principles (e.g., defence in depth, fail secure).

  3. Define the required Architecture Building Blocks (ABBs)
    Specify what the system must do in technology-agnostic terms.
    Document your design decisions and rationale – this is critical for auditability and reuse.

  4. Identify the Solution Building Blocks (SBBs) that realise your ABBs
    Map each ABB to concrete technologies, patterns, or products appropriate for your context.

Learn more