Useful Tools and Models

This is a collection of different tools, templates, frameworks and articles which have been created to achieve different goals. Over time this will grow as I slowly update and port things over from my old site and my personal store of material I have created. Feel free to use as you see fit the only thing I ask is that you reference me as the original author and drop me a quick email to let me know what you've used and how it has proved useful as this helps me understand reach and utility. Also feel free to drop suggestions about how it could be made better. You can reach me on esa@assureccontrol.com

Security Services Ontology/ERD

Stacks Image 76

This reference architecture, rooted in the SABSA framework, serves as an ontology or ERD that maps the relationships between business drivers, security domains, controls, and governance processes. Visualising how these elements connect enables a risk-driven approach to security architecture—helping organisations identify gaps, strengthen controls, and align security initiatives with business objectives and compliance requirements.

Security Controls Matrix

Stacks Image 79

This Security Controls Matrix organises key security domains, controls, and business drivers into a cohesive taxonomy. By mapping relationships across layers—ranging from governance and risk to technology and operations—it helps identify gaps, align initiatives with strategic objectives, and drive risk-based security architecture.

Risk Ontology

Stacks Image 131

The “Risk Ontology” presentation introduces a detailed framework for understanding, managing, and mitigating risks within an organisation. By clearly defining critical concepts such as threats, vulnerabilities, controls, and metrics, it provides a structured approach to aligning security measures with business objectives and risk appetite.

The document delves into the relationships between risk elements, such as how threats exploit vulnerabilities to target assets, and outlines the roles of amplifiers, inhibitors, and catalysts in shaping risk scenarios. It also explains the importance of Key Risk Indicators (KRIs), Key Control Indicators (KCIs), and Key Performance Indicators (KPIs) in monitoring, measuring, and improving an organisation’s security posture.

For professionals responsible for risk management, this resource offers insights into building Protection Level Agreements (PLAs), evaluating security maturity, and understanding dependencies that influence risk exposure. This ontology is designed to enhance clarity about risk, which should help your organisation’s ability to anticipate, mitigate, and respond to risks effectively.

Vulnerability Management Frameworks

Stacks Image 180

These framework models provide a holistic approach to cybersecurity and vulnerability management, integrating industry standards, tools, and processes to enhance organisational resilience against cyber threats. It focuses on vulnerability detection and scoring using standards like CVSS and CVE, secure configurations through compliance checks and endpoint hardening, and secure software development via application security testing. It emphasises cyber threat intelligence sharing with protocols like STIX and TAXII and malware analysis through CAPEC and MAEC. The framework also supports incident investigation to refine controls and incorporates industry benchmarks, such as XCCDF, for secure baselines and interoperability. By aligning business processes with technology controls, it reduces attack surfaces, ensures licence compliance, and strengthens software management, creating a robust, standardised defence against evolving cyber risks.

Enterprise or solutions architects leverage this framework to design and implement robust cybersecurity architectures that align with organisational goals and industry best practices. By integrating tools and standards like CVSS, XCCDF, and STIX, they ensure consistent vulnerability management, secure configurations, and streamlined threat intelligence sharing. The framework supports the identification and mitigation of vulnerabilities across software, endpoints, and networks, allowing architects to proactively reduce the attack surface and enhance compliance. It provides structured methodologies for assessing risks, hardening builds, and embedding security into the software development lifecycle through practices like static and dynamic application security testing. Additionally, architects use the framework to facilitate interoperability between security tools and teams, enabling a cohesive, scalable, and efficient cybersecurity strategy tailored to the organisation’s needs.

Threat Intelligence Service Framework

Stacks Image 190

The Threat Intelligence and Predictive Security Framework offers a comprehensive methodology for enhancing an organisation's resilience against cyber threats by integrating threat intelligence, predictive analytics, and collaborative threat mitigation strategies. It emphasises the identification, prioritisation, and proactive management of risks across organisational assets, aligning security investments with current and emerging threat landscapes.

Key Features and Focus Areas:

Threat Intelligence Management:

  • Facilitates the collection, validation, and dissemination of actionable threat intelligence to improve situational awareness and support security operations.

  • Incorporates feedback loops, reporting mechanisms, and sharing protocols to ensure intelligence remains relevant and impactful.

Threat Modelling and Risk Prioritisation: * Provides structured frameworks and tools for identifying and assessing threats.

  • Utilises methodologies for attack surface mapping, risk scoring, and planning to prioritise remediation efforts effectively.

Predictive Analytics and Behavioural Analysis:

  • Employs machine learning and behavioural models to forecast potential threats and anomalies.

  • Supports proactive security measures by identifying attack patterns and high-risk scenarios before they materialise.

Threat Hunting:

  • Focuses on detecting hidden threats within an organisation’s environment using advanced techniques, such as hypothesis-driven exploration and endpoint threat analysis.

  • Strengthens defences against advanced persistent threats (APTs) and post-breach indicators.

Adversary Profiling:

  • Develops a comprehensive understanding of adversaries’ behaviours, motives, and tactics to refine defensive strategies.
  • Leverages intelligence on threat actor activities to enhance situational awareness.

Vulnerability and Exploit Intelligence:

  • Aggregates and monitors vulnerability information, supporting prioritised remediation activities to reduce risks.

  • Combines exploit intelligence with proactive defence mechanisms to address high-priority threats.

Threat Sharing and Collaboration:

  • Promotes cooperative threat intelligence sharing with industry partners, using standards like STIX and TAXII.

  • Enhances collective defence by fostering cross-organisational communication and coordination.

Strategic Threat Landscape Analysis:

  • Aligns security investments with long-term strategic goals by evaluating trends and forecasting future threats.

  • Supports decision-making by mapping risks to business objectives and ensuring readiness for evolving challenges.

Business Value: This framework empowers organisations to preemptively address threats, enhance collaboration, and align cybersecurity initiatives with strategic business objectives. By combining advanced analytics, industry standards, and structured methodologies, it delivers actionable insights, reduces attack surfaces, and establishes a robust defence against the ever-changing threat landscape.

Security architects can use this framework to:

  • Align security strategies with business objectives.
  • Integrate predictive tools and intelligence-sharing protocols for enhanced situational awareness.
  • Proactively identify vulnerabilities and adversary tactics to reduce risks.
  • Strengthen resilience against cyber threats by embedding security into operational and strategic planning.

This model provides a scalable, adaptable solution to tackle modern cybersecurity challenges effectively.


Presentations

What Good Looks Like - Metrics

Stacks Image 128

The "What Good Looks Like - Using KPI’s, KCI’s and KRI's Effectively" presentation provides a practical guide for organisations looking to build meaningful and actionable security metrics. Designed with different stakeholder needs in mind—senior leaders, CISOs, and operational teams—it offers a structured approach to measuring and managing security effectiveness.

The framework addresses common challenges, such as focusing too much on technology rather than outcomes, and demonstrates how to align metrics with business priorities and risk management objectives. By breaking down concepts like Key Risk Indicators (KRIs), Key Control Indicators (KCIs), and Key Performance Indicators (KPIs), the presentation helps organisations develop metrics that answer essential questions about risk, control effectiveness, and operational performance.

Whether you’re looking to streamline reporting, improve decision-making, or demonstrate value to the business, this deck provides some tools and insights to get started.

Originally produced in 2021 for presentation at COSAC 21

Herding Cats in a DevSecOps World

Stacks Image 122

The “Herding Cats” presentation offers a clear and structured exploration of how security integrates into modern software development pipelines. It provides an end-to-end view of the DevSecOps lifecycle, from planning and coding to deployment and monitoring, highlighting the importance of constant feedback and security validation throughout.

With practical insights into common security concerns, essential tools, and effective controls, this presentation bridges the gap between traditional security practices and the unique demands of agile development and continuous delivery. It emphasises the importance of tools like Static and Dynamic Application Security Testing (SAST/DAST), Software Composition Analysis (SCA), and Runtime Application Security Protection (RASP), while also addressing critical operational aspects like vulnerability management, dependency checking, and digital trust.

Whether you are a developer, security professional, or organisational leader, this deck will help you understand how to embed security seamlessly into your DevOps processes, enabling you to deliver secure, resilient applications without sacrificing speed or agility.

Originally produced in 2021 for presentation at COSAC 21. This is still relevant but could do with an update to reflect some of the new AI enhanced practices. Its on my to do list.

Business-Driven Cloud Architecture - Discover the Strategic Key to Unlocking Cloud Potential

Dive into "Building Cloud Architectures Top-Down: Aligning with Business Motivations," a presentation that redefines cloud strategy. Unlike traditional, technology-first approaches, this session offers a top-down framework that ensures every cloud initiative is driven by business goals and outcomes.

Learn why many organisations fail to realise the promised benefits of cloud adoption and how aligning with business motivations can bridge this gap. Explore the strengths and limitations of industry frameworks, such as the Microsoft Cloud Reference Architecture, through a lens of business-aligned methodologies like SABSA and POPIT.

Packed with actionable insights, this presentation guides you through understanding business requirements, capability development, and implementing operating models that enable security, efficiency, and innovation. Whether you're embarking on a cloud migration or refining your strategy, this session is your roadmap to a business-driven cloud transformation.

Originally produced in 2024 for presentation at COSAC 24 and presented again at SABSA World London Jan 2025


Publications

From Vision to Value: Crafting Business-Driven Cloud Architectures for Strategic Success

Discover how to craft business-driven cloud architectures that deliver measurable value and align with strategic objectives. This article explores practical approaches to designing cloud solutions that go beyond technology, focusing on achieving business goals and maximising ROI. Whether you're navigating cloud adoption, optimising existing architectures, or aligning IT with organisational strategy, this guide provides actionable insights and expert advice.

Click to learn how to turn your cloud vision into strategic success.

Building an Effective Metrics Programme: A Strategic Roadmap for Cybersecurity Professionals

Discover the strategic roadmap to building an effective metrics programme tailored for cybersecurity professionals. This article provides actionable insights into creating metrics that align with business objectives, drive decision-making, and demonstrate the value of security initiatives. Whether you’re looking to measure operational performance or showcase strategic impact, this guide offers practical steps and expert advice to help you design a metrics programme that delivers real results.

Click to explore how you can elevate your cybersecurity metrics to a powerful strategic tool.

Designing Metrics That Deliver: How SABSA Transforms Metrics Programmes

Unlock the potential of metrics to drive meaningful security outcomes with this article on how the SABSA framework revolutionises metrics programmes. Explore how SABSA’s business-driven approach helps organisations design metrics that truly align with strategic goals, delivering actionable insights and measurable value. Whether you’re refining your existing metrics programme or starting from scratch, this piece provides practical tips and real-world examples to transform your approach.

Click to discover how SABSA can elevate your metrics to the next level.

How ITIL supports Proactive Cyber Security delivery

Discover how ITIL, a globally recognised framework for IT service management, can enhance proactive cyber security strategies in your organisation. This insightful article explores how ITIL's principles align with robust security practices, enabling organisations to anticipate threats, mitigate risks, and strengthen their defences. Whether you're looking to optimise incident response, improve change management, or integrate security into your IT operations, this piece offers valuable perspectives and practical guidance.

Click to learn how ITIL can transform your cyber security delivery.

How to Maximise the Value of MDR Services in a Rapidly Evolving Cybersecurity Landscape

In today’s rapidly evolving cybersecurity landscape, organisations must extract maximum value from their Managed Detection and Response (MDR) services to stay ahead of sophisticated threats. This article delves into strategies for optimising MDR effectiveness, emphasising the integration of advanced technologies, the importance of skilled human oversight, and the need for adaptive approaches to counteract the increasing use of AI by cyber criminals. Gain actionable insights to enhance your organisation’s security posture and effectively navigate the complexities of modern cyber threats.

Click to learn how.

Transitioning Your MDR Services: Building In-House Capability vs. Partnering with a New Provider or the third way…

Are you evaluating the next steps for your organisation’s Managed Detection and Response (MDR) strategy? Transitioning from your current MDR provider can be a pivotal moment, and the decision to build in-house capabilities, partner with a new provider, or adopt a hybrid approach is far from simple. This article breaks down the pros and cons of each option, offering practical insights to help you navigate this critical choice. Whether you’re looking to enhance control, optimise costs, or strike the perfect balance, this guide provides the clarity you need.

Click to explore actionable advice and make an informed decision.

Strengthening Cybersecurity Through Improved Service Management and Enterprise Architecture

The UK Ministry of Defence's Global Strategic Trends report underscores the escalating cyber threats confronting organisations. This article delves into how integrating robust service management and enterprise architecture can bolster cybersecurity defences. By embedding security throughout the ITIL Service Lifecycle and adopting a comprehensive enterprise architecture, organisations can enhance resilience against sophisticated cyber adversaries.

Click to find out how.

Building Resilience: Optimising Threat and Vulnerability Management in an Evolving Cyber Landscape

In today's rapidly evolving cyber landscape, organisations face an increasing array of threats and vulnerabilities that can compromise their operations and data integrity. The article "Building Resilience: Optimising Threat and Vulnerability Management in an Evolving Cyber Landscape"delves into strategies for enhancing cyber resilience, focusing on proactive threat identification, effective vulnerability management, and the implementation of robust security measures. By exploring best practices and innovative approaches, this piece offers valuable insights for organisations aiming to strengthen their defences against sophisticated cyber threats.

Counter

I don't capture anything or share, sell, or anything else to third parties.