{"id":227,"date":"2017-09-13T08:57:39","date_gmt":"2017-09-13T06:57:39","guid":{"rendered":"http:\/\/www.scag.co.za\/wordpress\/?p=227"},"modified":"2017-09-13T08:57:39","modified_gmt":"2017-09-13T06:57:39","slug":"on-security-architecture-and-certification-part-1","status":"publish","type":"post","link":"https:\/\/www.scag.co.za\/wordpress\/2017\/09\/13\/on-security-architecture-and-certification-part-1\/","title":{"rendered":"On security architecture and certification, part 1"},"content":{"rendered":"<p><strong>Professional certification is a necessity in the IT industry. <span class=\"veryhardreadability\">Tertiary education <\/span><span class=\"adverb\">barely<\/span><span class=\"veryhardreadability\"> scratches the surface of the required skills in the broad range of career paths available to an IT graduate<\/span>. Some career paths have many certification options available to them. <span class=\"veryhardreadability\">With security being no exception, the problem is that security certifications are misunderstood and often very expensive<\/span>.<\/strong><\/p>\n<p><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-0-0\">In this post, I will dispense with my thoughts on certification in the security industry and how they may be useful to a security architect<\/span><\/span><span data-offset-key=\"3n3cr-1-0\">. *Note: I had planned one post for my thoughts on this topic, but it seems I have a lot to say. So I have decided to split the post up into a series of posts(this being the first).<\/span><\/p>\n<p><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-0-0\">Security architecture is a cross-cutting field requiring skills in a wide range of areas<\/span><\/span><span data-offset-key=\"3n3cr-1-0\">. In particular, technical knowledge of enterprise-wide disciplines is essential. <\/span><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-2-0\">In this article, I <\/span><\/span><span class=\"complexword\"><span data-offset-key=\"3n3cr-3-0\">shall<\/span><\/span><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-4-0\"> be focusing <\/span><\/span><span class=\"adverb\"><span data-offset-key=\"3n3cr-5-0\">specifically<\/span><\/span><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-6-0\"> on the needs of an application security architect<\/span><\/span><span data-offset-key=\"3n3cr-7-0\">.<\/span><br \/>\n<strong><br \/>\nWhat certifiable skills does a security architect need?<\/strong><br \/>\nIt is not enough to have a strong affinity towards security. The security architect needs to provide inputs into the other specialized architectures, from a security perspective. Therefore a security architect needs to have good knowledge of network, data, infrastructure, application and enterprise architecture and how to apply security to them. This doesn&#8217;t mean the security architect should be looking at getting certification in these areas, but reading about the topics would certainly help where experience in the area has not materialized yet. Network security certifications in particular are usually vendor driven, and this wont help the architect who needs to ideally be technology agnostic in this area.<\/p>\n<p>Having technology specific certifications has its place depending on the architects role, but having generalized certifications will help the architect adapt to a broader business need. Security specific certifications for the most part are technology agnostic, and cover a broad range of topics. But this is where deciding on which certification to do becomes tricky. An application security architect needs to have strong technical skills, knowledge of architectural frameworks, and knowledge of compliance frameworks. In addition they need to know about risk, but most importantly how to communicate that risk in a language the audience understands.<\/p>\n<p><span class=\"adverb\"><span data-offset-key=\"3n3cr-0-0\">Traditionally<\/span><\/span><span class=\"veryhardreadability\"><span data-offset-key=\"3n3cr-1-0\">, architects from all fields have strayed a bit too far from where they got their hands dirty coding in the early days of their careers<\/span><\/span><span data-offset-key=\"3n3cr-2-0\">. <\/span><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-3-0\">This tends to result in the typical &#8220;ivory tower&#8221; kind of architecture, which is undesirable<\/span><\/span><span data-offset-key=\"3n3cr-4-0\">. <\/span><span class=\"adverb\"><span data-offset-key=\"3n3cr-5-0\">Personally<\/span><\/span><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-6-0\">, <\/span><\/span><span class=\"qualifier\"><span data-offset-key=\"3n3cr-7-0\">I feel<\/span><\/span><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-8-0\"> an architect that is willing to throw together some code to <\/span><\/span><span class=\"complexword\"><span data-offset-key=\"3n3cr-9-0\">elucidate<\/span><\/span><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-10-0\"> an idea or proof of concept is <\/span><\/span><span class=\"adverb\"><span data-offset-key=\"3n3cr-11-0\">extremely<\/span><\/span><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-12-0\"> valuable<\/span><\/span><span data-offset-key=\"3n3cr-13-0\">. Their code doesn&#8217;t have to be amazing, it <\/span><span class=\"qualifier\"><span data-offset-key=\"3n3cr-14-0\">just<\/span><\/span><span data-offset-key=\"3n3cr-15-0\"> has to get the idea across. <\/span><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-16-0\">The engineers can then work with an actual technical artifact as opposed to written documentation<\/span><\/span><span data-offset-key=\"3n3cr-17-0\">. <\/span><span class=\"veryhardreadability\"><span data-offset-key=\"3n3cr-18-0\">I would stop short of certifying in this area though, as many architects tend to have some level of development background (usually a computer science degree)<\/span><\/span><span data-offset-key=\"3n3cr-19-0\">. <\/span><span class=\"complexword\"><span data-offset-key=\"3n3cr-20-0\">Provided that<\/span><\/span><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-21-0\"> the coding skills <\/span><\/span><span class=\"passivevoice\"><span data-offset-key=\"3n3cr-22-0\">are exercised<\/span><\/span><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-23-0\"> once in a while, a computer science degree would <\/span><\/span><span class=\"adverb\"><span data-offset-key=\"3n3cr-24-0\">typically<\/span><\/span><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-25-0\"> suffice<\/span><\/span><span data-offset-key=\"3n3cr-26-0\">. <\/span><span class=\"hardreadability\"><span data-offset-key=\"3n3cr-27-0\">An architects code will rarely (if ever) make it to production, so the architect need not be a coding rockstar (it does help, though)<\/span><\/span><span data-offset-key=\"3n3cr-28-0\">.<\/span><\/p>\n<figure id=\"attachment_235\" aria-describedby=\"caption-attachment-235\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.scag.co.za\/wordpress\/cmswp768-content\/uploads\/2017\/09\/SecurityArchitectureVenn-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-235\" src=\"https:\/\/www.scag.co.za\/wordpress\/cmswp768-content\/uploads\/2017\/09\/SecurityArchitectureVenn-1-300x293.png\" alt=\"Security Architecture skills venn diagram\" width=\"300\" height=\"293\" srcset=\"https:\/\/www.scag.co.za\/wordpress\/cmswp768-content\/uploads\/2017\/09\/SecurityArchitectureVenn-1-300x293.png 300w, https:\/\/www.scag.co.za\/wordpress\/cmswp768-content\/uploads\/2017\/09\/SecurityArchitectureVenn-1-768x749.png 768w, https:\/\/www.scag.co.za\/wordpress\/cmswp768-content\/uploads\/2017\/09\/SecurityArchitectureVenn-1.png 817w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-235\" class=\"wp-caption-text\">*By no means a complete skillset<\/figcaption><\/figure>\n<p>There are of course, many soft skills required of a security architect, but these cant be gained through certification. Similarly to a consultant, an architect will never be an expert in every field. What matters is the ability to use what knowledge they have to understand the environment in which they are working.<\/p>\n<p>This is the first post of a series of posts, which I will be releasing as I complete them. The next posts will be:<br \/>\nPart 2, The state of play: Security certification<br \/>\nPart 3, CISSP: So special it needs its own post<br \/>\nPart 4, What other certifications are out there, and their value<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Professional certification is a necessity in the IT industry. Tertiary education barely scratches the surface of the required skills in the broad range of career paths available to an IT graduate. Some career paths have many certification options available to them. With security being no exception, the problem is that security certifications are misunderstood and &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.scag.co.za\/wordpress\/2017\/09\/13\/on-security-architecture-and-certification-part-1\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;On security architecture and certification, part 1&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43,44],"tags":[],"class_list":["post-227","post","type-post","status-publish","format-standard","hentry","category-architecture","category-certification","entry"],"_links":{"self":[{"href":"https:\/\/www.scag.co.za\/wordpress\/wp-json\/wp\/v2\/posts\/227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.scag.co.za\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.scag.co.za\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.scag.co.za\/wordpress\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.scag.co.za\/wordpress\/wp-json\/wp\/v2\/comments?post=227"}],"version-history":[{"count":11,"href":"https:\/\/www.scag.co.za\/wordpress\/wp-json\/wp\/v2\/posts\/227\/revisions"}],"predecessor-version":[{"id":243,"href":"https:\/\/www.scag.co.za\/wordpress\/wp-json\/wp\/v2\/posts\/227\/revisions\/243"}],"wp:attachment":[{"href":"https:\/\/www.scag.co.za\/wordpress\/wp-json\/wp\/v2\/media?parent=227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.scag.co.za\/wordpress\/wp-json\/wp\/v2\/categories?post=227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.scag.co.za\/wordpress\/wp-json\/wp\/v2\/tags?post=227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}