top of page

Introducing ISAUnited's
Security by Design Methodology

A Threat-based Approach to Designing Security Architecture.

This ISAUnited Defensible Architecture methodology outlines a new process-oriented approach to developing enterprise security architecture. It draws from both well-known open frameworks as well as ISAUnited’s rich experience in architectural design and development. In this paper, we provide you with the various phases of the ISAUnited Defensible Architecture, and how they form the foundation for your next enterprise architecture.


Introduction to the ISAU Defensible Architecture (IDA) Methodology

Our commitment to security architecture has resulted in ISAUnited supporting dedicated teams of security architects focused on advancing architectural security posture. We designed this teachable approach to deliver a security architecture foundation for organizations to institute a proper security architecture methodology to address business requirements and solve problems.

ISAUnited has developed this approach into a complete architectural methodology and process framework. With great pride, we’re excited to introduce this to a wider audience as the ISAUnited Defensible Architecture methodology. We know that organizations see value in a structured approach to security architecture, which is why ISAUnited developed the Defensible Architecture methodology.

This methodology allows any enterprise security team to develop a secure architecture using a formulated, accountable, and comprehensive process and to help security practitioners explain, develop, mature their security posture, and align with security best practices. Through our process, architects are able to accurately capture and record business requirements and convert these into tangible security solutions.

As a member, you will have full access to the Design process below 

You will be introduced to the methodology, its conception, and ease of use. You will look at each layer of the design process in more detail. Explore the purpose of each phase layer, and how it contributes to the overall outcome of the ISAUnited Defensible Architecture Design.

ISAU Design Wheel

Become a member today to access the new design methodology and other great documentation.




ISAU Library is your platform for the latest in security architecture design and practice. This core collection covers all technical areas of security architecture. ISAU’s Library includes:

Foundational and Technical Standards



Manuals and Reports

and more.

ISAU continues to respond to practitioners’ needs for reliable professional tools.  We will continue to share updates on our standards transformation. 


Join our community today!

Business Meeting

Join ISAUnited for the professional support and growth that you won't find anywhere else

ISAUnited gives you the best professional and technical resources.

bottom of page