You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/8a-design-devsecops-processes.yml
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/3-cloud-adoption-framework-secure-methodology.md
-20Lines changed: 0 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -94,26 +94,6 @@ Security is a human discipline that requires clear roles and responsibilities. T
94
94
95
95
As a Security Architect, you work across these teams to ensure security is integrated into designs, decisions are informed by risk, and controls are operationally sustainable.
96
96
97
-
## Security transformation drivers
98
-
99
-
Security organizations face two major transformations:
100
-
101
-
**Security as business risk**: Security has evolved from a purely technical discipline into business risk management. This shift is driven by:
102
-
- Digital transformation increasing the potential attack surface
103
-
- Threat landscape growth fueled by industrialized attack economies with specialized skills and commoditized attack tools
104
-
105
-
**Platform change**: Security teams are grappling with a technical platform shift to the cloud—comparable to factories moving from private generators to an electrical grid. While teams often have the right foundational skills, they can be overwhelmed by changes to nearly every process and technology.
106
-
107
-
**Shift in expectations**: Business agility, especially for digital transformation, can quickly unseat market leaders. While security once started with "no" to block projects, the urgency of digital transformation requires a new engagement model: "let's talk about how to stay safe while you do what is needed to stay relevant."
108
-
109
-
## Guiding lasting transformation
110
-
111
-
Transforming how business and technology teams view security requires alignment with priorities, processes, and risk frameworks:
112
-
113
-
-**Culture**: Security must focus on safely meeting the business mission, not impeding it. Security must also become normalized as the internet allows adversaries to attempt attacks at any time. This cultural shift requires improved processes, partnerships, and ongoing leadership support.
114
-
-**Risk ownership**: Accountability for security risk should be assigned to the same roles that own all other risks, freeing security to be a trusted advisor rather than a scapegoat. Security should be responsible for sound, balanced advice communicated in business language, but not held accountable for decisions it doesn't own.
115
-
-**Security talent**: Security talent is in chronic shortage. Organizations should develop and distribute security knowledge and skills by growing security skill sets within existing IT and business teams, and by recruiting diverse skill sets to security teams for fresh perspectives.
116
-
117
97
## Bringing it all together
118
98
119
99
The CAF Secure methodology provides Security Architects with a comprehensive framework for integrating security into cloud adoption. By applying CIA Triad principles and Zero Trust across all CAF phases, you ensure that security isn't an afterthought but a foundational element of your cloud architecture.
0 commit comments