Cyber Security
Cyber security denotes measures, principles and strategies to protect digital systems, data and networks from attacks, misuse and failures.
Classification
- ComplexityHigh
- Impact areaOrganizational
- Decision typeArchitectural
- Organizational maturityAdvanced
Technical context
Principles & goals
Use cases & scenarios
Compromises
- Lack of governance leads to inconsistent security measures.
- Outdated systems increase attack surface.
- Human error and social engineering remain critical risks.
- Integrate automated security checks into CI/CD.
- Conduct regular security and penetration tests.
- Apply least privilege and role-based access control.
I/O & resources
- Asset inventory and data classification
- Risk assessment and threat model
- Security policies and role models
- Protective controls and configuration standards
- Monitoring and alerting mechanisms
- Incident reports and remediation actions
Description
Cyber security comprises a broad spectrum of technical, organisational and procedural measures for confidentiality, integrity and availability of information. It combines risk assessment, protective controls and detection mechanisms and requires cross-functional coordination plus continuous adaptation to evolving threats.
✔Benefits
- Reduced likelihood of successful attacks.
- Protection of critical business processes and reputation.
- Improved compliance and auditability towards regulators.
✖Limitations
- No absolute security; residual risks remain.
- High resource and expertise requirements.
- Potential conflicts between security and usability.
Trade-offs
Metrics
- Mean time to detect (MTTD)
Average time from the occurrence of a security breach to detection.
- Mean time to restore (MTTR)
Average time to restore normal services after an incident.
- Number of critical vulnerabilities
Number of unresolved high-criticality vulnerabilities within a reporting period.
Examples & implementations
NIST Cybersecurity Framework implementation
Organization uses NIST CSF to structure risks, controls and maturity measurement.
Zero-trust network architecture in the enterprise
A global company applies zero-trust principles for segmentation and identity verification.
OWASP Top Ten used as developer checklist
Development teams integrate OWASP checks into CI/CD to avoid web vulnerabilities.
Implementation steps
Perform inventory and risk assessment.
Define governance and responsibility structure.
Prioritize controls and implement them iteratively.
⚠️ Technical debt & bottlenecks
Technical debt
- Old libraries without signed security updates.
- Incompatible logging formats hinder forensics.
- Missing automation for patch and configuration management.
Known bottlenecks
Misuse examples
- Focusing only on firewall rules without patch management.
- Skipping backup strategies for cost reasons.
- Excessive restrictions that block business processes.
Typical traps
- Underestimating insider threats and employee risks.
- Neglecting maintenance of security rules and exceptions.
- Undefined backup and recovery tests.
Required skills
Architectural drivers
Constraints
- • Budget constraints for security investments
- • Legal requirements for data sharing and privacy
- • Technical dependencies on third parties