Learning Library

← Back to Library

Cybersecurity Architect: Role, Mindset, and Tools

Key Points

  • The cybersecurity architect’s work begins with gathering stakeholder requirements, akin to how a building architect consults owners to define the purpose, size, and budget of a structure.
  • Once requirements are clarified, the architect creates a high‑level blueprint that guides specialized contractors (or implementation teams) who execute the detailed design.
  • Security and safety must be integrated into the blueprint from the outset, including controls such as access locks, surveillance cameras, fire detection, and “firewalls” that limit damage spread.
  • The architect’s mindset is that of a planner—not a hands‑on implementer—focusing on overarching security principles, risk mitigation, and ensuring the final solution meets both functional and protective goals.

Sections

Full Transcript

# Cybersecurity Architect: Role, Mindset, and Tools **Source:** [https://www.youtube.com/watch?v=E9pHJRRfAhw](https://www.youtube.com/watch?v=E9pHJRRfAhw) **Duration:** 00:14:05 ## Summary - The cybersecurity architect’s work begins with gathering stakeholder requirements, akin to how a building architect consults owners to define the purpose, size, and budget of a structure. - Once requirements are clarified, the architect creates a high‑level blueprint that guides specialized contractors (or implementation teams) who execute the detailed design. - Security and safety must be integrated into the blueprint from the outset, including controls such as access locks, surveillance cameras, fire detection, and “firewalls” that limit damage spread. - The architect’s mindset is that of a planner—not a hands‑on implementer—focusing on overarching security principles, risk mitigation, and ensuring the final solution meets both functional and protective goals. ## Sections - [00:00:00](https://www.youtube.com/watch?v=E9pHJRRfAhw&t=0s) **Cybersecurity Architect Role Overview** - The segment outlines the cybersecurity architect’s responsibilities, mindset, stakeholder interactions, and the tools and domains they employ, using a building-design analogy to illustrate the process. - [00:03:09](https://www.youtube.com/watch?v=E9pHJRRfAhw&t=189s) **IT Architecture vs Cybersecurity Planning** - The speaker outlines how stakeholders collaborate with an IT architect to create reference diagrams that guide engineers in building system components, then contrasts a conventional architect’s focus on functionality with a cybersecurity architect’s emphasis on anticipating and mitigating failure scenarios. - [00:06:18](https://www.youtube.com/watch?v=E9pHJRRfAhw&t=378s) **Cybersecurity Architect Mindset and Diagrams** - The speaker describes a cybersecurity architect as a strategic, failure‑focused whiteboard thinker who uses high‑level visual tools—business context, system context, and architecture overview diagrams—to illustrate entity relationships and system structure. - [00:09:25](https://www.youtube.com/watch?v=E9pHJRRfAhw&t=565s) **Applying the NIST Cybersecurity Framework** - The speaker explains how IT architects can use the NIST Cybersecurity Framework as a comprehensive checklist—covering identify, protect, detect, respond, and recover—to structure security controls much like building codes for building architects. - [00:12:32](https://www.youtube.com/watch?v=E9pHJRRfAhw&t=752s) **Seven Core Cybersecurity Domains Overview** - The speaker outlines the seven cybersecurity domains—identity & access management, endpoint security, network security, application security, data protection, SIEM monitoring, and automated response orchestration—and explains how they collectively detect and remediate threats. ## Full Transcript
0:00In the previous two videos on Cybersecurity Architecture Fundamentals, 0:03we discussed principles that you should follow--essential security principles. 0:09The next video, we discussed the CIA Triad, where you could basically use this as a checklist 0:14to know that you've done a cybersecurity architecture correctly. 0:18In this video, we're going to focus on the cybersecurity architect. 0:22In particular, their role, the mindset that they have to adopt in developing a secure solution, 0:27the tools that they use-- tools of the trade --and the domains that they have to operate in. 0:33All right, we're going to start off with the role and their mindset. 0:37Where this all begins is with stakeholders. 0:40These are the people that have a vested interest in getting this solution right. 0:44So we're going to take a look at two examples here of an architect 0:48who is working on a building and an IT architect who's working on building an IT system. 0:55In both cases, we're going to start with stakeholders and we're going to take their inputs into the architect. 1:01The architect is going to wonder, "Okay, we're building a building, but what kind of building is this going to be? 1:07Is it going to be a business? 1:08Is it going to be a home?" Well, in this case, we're told it's going to be a home. 1:12It's going to be a multi-family dwelling. 1:14So it's a townhouse, maybe, for instance. 1:17So we have an idea already what it's going to be, what sort of size we want, what kind of price range we want it to be in. 1:23Those are the things the stakeholders are giving the architect. 1:27The architect is going to take that and develop a blueprint. 1:30That blueprint then becomes the plan that the contractors come along and implement. 1:35So we've got contractors--who are plumbers and carpenters and things of that sort. 1:42They're going to be the ones that do the actual implementation. 1:45If the architect shows up on the job site with a hammer in hand, 1:48you might be in trouble because that's not their area of expertise. 1:52You want these people that are experts in doing and these guys who are experts in planning and coming up with the big ideas. 1:59So that's a little bit of analogy. 2:01Now, an architect might say this is what I generally want this thing to look like. 2:05But we need to take into account some other things after I've kind of come up with the basic sketch of what this is. 2:11I need to think about safety and security as well with this building. 2:15So, for instance, I want locks on the doors, of course, I don't want just anybody to be able to to walk in. 2:21I might put security cameras in each of the units, at least on the outside, maybe on the inside. 2:28So that, again, I have an ability to monitor, maybe even alarm systems. 2:33I might be concerned about fire in one of the units. 2:36So I put a smoke detector on the ceiling in each one of these so that we can detect that. 2:41And then, if I actually do have a fire, well, I'd like to have something that we call a firewall 2:47that slows the spread of fire from one unit to the next. 2:51It doesn't prevent it completely, but at least it keeps it from spreading really, really fast. 2:56So these are kind of mitigations things that we add on to the architecture to make it more safe, to make it more secure. 3:03And the architect dreams those up and the contractors implement and put those things together. 3:09Now let's take a look at an IT example of the same sort of thing. 3:13Here once again, we just start with stakeholders. 3:16And they're going to work with the architect. 3:19The architect, instead of coming up with a blueprint, is going to come up with an analogy to that, 3:24which is going to be some type of reference architecture, or some type of architecture overview diagram 3:30or diagrams that show the interrelations of the high level components of the system. 3:36That then is going to get translated into an actual IT architecture. 3:42So here we've got in particular a user who is going to use a workstation, maybe a mobile device, or a desktop device. 3:51They're going to come across a network to hit a web server. 3:54That's going to hit an app server, which is going to hit a database and we're going to get their data. 3:59This is a very simple type of architecture. 4:02Now, the architect is then going to ask the engineers--the architect has been doing their work basically from a whiteboard. 4:11Think of it this way: architects--whiteboard, engineers--keyboard. 4:17This is where they're going to be doing their work as they start implementing this system. 4:22This architect now also has to consider what might be some failure cases. 4:27This is the difference between a sort of normal IT architect and a cybersecurity architect. 4:32The normal architect thinks about how a system will work. 4:36The cybersecurity architect thinks about how it will fail. 4:40Now, the cybersecurity architect has to first understand how the system is going to work, or they don't know how it might fail. 4:46So they have to have that level of understanding. 4:49Then they have to add on to it. 4:50What are the possible things that could go wrong? 4:52So let's ask. 4:53What could go wrong with this user? 4:56Well, it could be someone stole their password, their credentials, so it's not this user anymore. 5:02So what do I need? 5:03Well, I'm going to put in multi-factor authentication, a mitigation, a way to check and compensate for that particular risk. 5:12What if we've got on this workstation a virus, or if it's a mobile device, maybe it's been jailbroken. 5:18Well, if it's a mobile device, I'll add mobile device management software to check for that. 5:24If it's another type of device--endpoint detection and response capabilities or antivirus capabilities to check there. 5:32And we continue across this. 5:34In the case of the network, well, just like over here on this building, 5:37we added firewalls in order to keep the spread of a fire from one unit from immediately spreading to another 5:44and providing a level of protective isolation. That's what we do with network firewalls. 5:49That's where we got that term. 5:51So I'm going to add network firewalls here to slow the spread of contagion or attack across this infrastructure. 5:58And then ultimately over here, I'm going to encrypt the data that's in the database. 6:03And I'm going to ask this IT engineer, whoever it is. 6:08And by the way, we'll have different engineers that are specialized in each of these areas. 6:12So I might have a database administrator that does the database encryption, 6:15a network administrator that implements the firewalls. 6:19Someone else who does the desktop, someone else who does the identity and access management capabilities. 6:24So all of these engineers are analogous to the different contractors. 6:29And the architect in both of these cases is coming up with the big picture, the big plans. 6:34So again, if you're thinking of a cybersecurity architect, think whiteboard rather than keyboard. 6:40And also think how will the system fail and what do I need to do to prevent that? 6:48Okay, now we've covered the role and mindset of the cybersecurity architect. 6:52Now let's talk about the tools of the trade. 6:56Well, it turns out that in the IT architect world, there are certain common diagrams that architects use. 7:02There's a business context diagram, a system context diagram, and an architecture overview diagram. 7:08These are just three examples that I think are particularly important. 7:12So, for instance, we'll talk with a business context diagram. 7:16Here we're trying to show relationships among the different entities in the system. 7:22So an example here, we've got a builder, we've got a marketing team, 7:26we've got tradesmen who are going to build the building, and then a buyer. 7:30And so we're showing the interrelationships amongst those various entities. 7:34It's a very high level, line-of-business sort of view. 7:38In the next one, the system context diagram, 7:41we're going to take that and decompose it further into what it would look like in a system. 7:46Now, this is just one aspect, this doesn't show all of them by any means. 7:49But here we have a project management system. 7:52There's a finance system that's trying to oversee 7:55and make sure we can afford to build this thing the way we need to and on budget. 7:59Blueprints that we're going to call in and do the building with a permitting system that we need to go off and get those. 8:05And then a graphical user interface that interfaces to all of it. 8:08That's just a very simple example of how the IT system that supports this business model might look. 8:16Then we can move further down into an architecture overview diagram. 8:20In this case, now we've got a project database, a scheduler that is getting status and reports 8:27that it's generating and then alerts whenever we're overbudget or behind schedule or things like that. 8:33So you notice with each one of these, it's a further level of detail, a further decomposition. 8:39And as I said, this is sort of the lingua franca, the common language of the architect. 8:44Any IT architect should be able to take these kinds of things and understand what they need to do. 8:50Now, a cybersecurity architect will look at this and need to understand how the system works. 8:55As I said before, they also need to envision how the system might fail. 9:00So in doing that, I'm going to take this architecture that my normal IT architect 9:06came up with and I'm going to try to put the security into this. 9:10Now, that's the typical practice and the way we do it. 9:13Remember in the first video, I talked about security principles--five that you should always do and one you should never do. 9:20And in the second video, I talked about the CIA Triad: confidentiality, integrity and availability. 9:25That's a checklist. 9:27So we're going to use those things. 9:28And in this video, I'm going to add another tool to your toolbox, and that's frameworks. 9:33In particular, a framework like this one that comes from the National Institute of Standards in the US. 9:39It's known as the Cybersecurity Framework. 9:41And what it does is it spells out--think of that an architect will need to follow certain building codes 9:48if they're coming up with a building. 9:50If you're an IT architect, we don't exactly have building codes 9:54that spell it out to that level of detail, but this is an analogy to that. 9:58So we're going to specify in the identify stage, 10:01these are the things that you need to do to identify users and data and things of that sort. 10:07We're going to spell out how we're going to protect those things once we've identified them. 10:11What levels of encryption and access control and things like that that we need. 10:14How we're going to detect when we have problems, we will spell that out. 10:20This is all listed as a very nice, comprehensive checklist for you to look at 10:25and consider if you've covered all the bases in the NIST's cybersecurity framework. 10:31How are we going to respond once we've detected a problem? 10:34And then how do we recover once we realize that we have now got to get the system all back and going again? 10:41So think about this as a cybersecurity architect, 10:43I'm going to apply these principles, the CIA Triad and some of these frameworks onto this. 10:50Now, that's the typical practice. 10:52What often happens is I get called in at this phase-- 10:56when the architecture is already done and they say, "Jeff, make it secure." Well, we can do it. 11:03That's the typical practice. 11:04But it's not the best practice. 11:06It's not the best practice because in the same way, you wouldn't like to have the building architect say, 11:12"We've got the building built, now come in and make it earthquake-proof." It's a little hard to do now. 11:19It would have been a whole lot better if, instead of at the implementation or architecture phase, 11:23you had engaged me up here. 11:25This is the best practice. 11:27This is when we ideally want to be bringing in the security architect 11:31and involve them at literally every step along the project lifecycle. 11:36So I'm going to do risk analysis and I'm going to see what are the risks in each one of these areas 11:42and apply some of these principles and frameworks. 11:45I'm going to develop a security policy. 11:47I'm going to develop then an architecture that goes along with the overall IT architecture, 11:53the normal mode architecture, so that security is not just a bolt on. 11:56It's something that was baked in to begin with. 11:59And then we add in the implementation. 12:01We're looking architecturally at these security principles and these frameworks and applying them throughout the process. 12:08This is how the architect applies their mindset, applies their role, and uses the tools of the trade. 12:15Okay, now, we've covered the cybersecurity architects role and their mindset. Also the tools of the trade. 12:23Now we're going to talk a little bit about the domains that they operate in. 12:27These are the cybersecurity domains that are the focus of the cybersecurity architect. 12:33So, for instance, they're going to take a look at a user who is coming into a system off of some endpoint device, 12:40traversing a network, hitting an application which pulls data from a database. 12:47Now, we each one of these are domains in cybersecurity. 12:51Identity and access management is where we're looking at the user. 12:54We're looking at making sure they're who they claim to be, that they have the right access, rights and things of that sort. 13:00That's a whole domain. 13:02Endpoint security--making sure their device is secure and can be trusted. 13:07The network itself being secure, the applications can't be broken into and the data is protected. 13:14We'll talk about each one of those domains and then add two more on top of that, because in fact, 13:19what we need to be able to do is take security telemetry and information from all of these parts of the working system, 13:25the functional system, and feed those into a monitoring system, a security information and event management capability 13:33that monitors all of this and lets us know if there is an intrusion, or if there's some reason that we need to go do an investigation. 13:41And then ultimately a response. 13:43If I find a problem, I need to be able to orchestrate my response to that problem so that we get it resolved as quickly as possible. 13:51These are the seven domains that we're going to be covering in the rest of the series. 13:56Thanks for watching. 13:57Before you leave, don't forget to hit subscribe. 13:59That way you won't miss the next installment of the Cybersecurity Architecture Series.