top of page
Work Stations
ISAU_shield_wht.png

ISAU  Library

Visitor Center

ISAUnited offers its members and students exclusive access to a comprehensive digital content library tailored specifically for architecture design practitioners focused on security-by-design principles. With a commitment to enhancing security measures within architectural projects, ISAUnited's digital content library serves as an invaluable resource hub for professionals seeking to seamlessly integrate robust security protocols into their designs.​

Overall, ISAUnited's dedication to providing a dedicated digital content library for architecture design practitioners underscores its commitment to advancing security standards and fostering innovation within the architectural community. By equipping members with the knowledge, tools, and resources they need to integrate security seamlessly into their designs, ISAUnited remains at the forefront of driving positive change and shaping the future of secure architectural practices.

Become a member today to access the new design methodology and other great documentation.

Latest Editions

Acronym Fun!

CDM

Title: Cybersecurity Design Model

Category: Model

Status: Active

Standard diagram set for showing systems, trust boundaries, interfaces, and failure domains—so teams can see data flow, where controls live, and how failures are contained; anchors design reviews, TADA overlays, and D10S mapping.

CEC

Title:Cybersecurity Engineering Concept

Category: Concept/Method

Status: Active

Decision playbook for planning and justifying builds across components, systems, and systems-of-systems; defines options and trade-offs, applies CIE for trust and failure containment, and records the rationale so choices are repeatable and auditable—feeding DRM decision logs, V&V, and CDM-aligned control placement mapped to D10S.

CIE

Title: Component Integrity Engineering

Category: Concept

Status: Active

Concept for establishing component trust and containment: define allowed interfaces, enforce identity and least-privilege authorization, validate data contracts, and guard each connection (mTLS/keys, rate limits, schema checks, logging); segment to limit blast radius and plan safe failure/rollback. Outputs a component trust profile and connection policy mapped to D10S, recorded in DRM, quantified with TMC, and visualized on CDMs.

CORE4

Title: Well‑Architected‑Secured Model

Category: Framework

Status: Active

Four-part model that anchors ISAUnited designs: (1) Enterprise Security Architecture (ESA), (2) Cloud Security Architecture (CSA), (3) ISAUnited Defensible Architecture (IDA) Design Methodology, and (4) Implementing Security Controls & Standards—linking strategy to patterns and controls so teams move from clear plans to auditable delivery and continuous improvement.

D10S

Defensible 10 Standards

Category: Standard

Status: Active

ISAUnited’s ten parent technical standards—Network, Cloud, Endpoint/Infrastructure, Application & DevSecOps, Data, IAM, Threat & Vulnerability, Monitoring/Detection/Response, Cryptography & Key Management, and Secure SDLC. Each standard specifies measurable requirements (inputs) and technical specifications (outputs) with V&V under D-SSF, ties decisions to CDMs/CECs and DRM for traceability, and guides control placement and patterns across real systems. Vendor-agnostic and auditable, expanded by sub-standards reviewed annually by the Technical Fellow Society.

D‑SSF

Defensible Standards Submission Function

Category: Framework/Process

Status: Active

Schema-and-authoring framework for ISAUnited sub-standards: classifies every item with R/P/C/T (Requirements, Principles, Controls, Technical Specifications), enforces architecture-grounded, traceable, and verifiable outputs with V&V, and applies numeric scoring—SRL (1–4), RE (1–5), IC (1–3) to compute Risk Score = (SRL + RE + IC) / 3, plus SP (1–3) for planning (with optional weighted scoring and visual risk badges). Integrates TADA for adversary evidence and TMC for quantitative thresholds; links decisions to DRM and produces audit-ready artifacts (e.g., LEP).

DRM

Design Risk Management

Category: Framework/Method

Status: Active

Lifecycle governance for design and change: identify hazards, options, and mitigations; assign a risk owner and acceptance; set measurable acceptance criteria and V&V; link decisions to CDM diagrams, TADA/DTM findings, and TMC thresholds; define release gates (Definition of Done) under D-SSF and produce an auditable record (risk register + LEP) for traceability across sprints.

 

DTM

Design Threat Model

Category: Method

Status: Active

Structured, design-time threat reasoning: identify crown assets and trust boundaries; define attacker goals and plausible paths; map threats with STRIDE/ATT&CK onto CDM views; select Preventive / Detective / Corrective controls; capture assumptions, residual risk, and testable acceptance criteria; record decisions in DRM and feed D-SSF V&V; pairs with TADA overlays and optional TBM visuals during design and change reviews.

D-Loop

Engineering 6 Ds Loop

Category: Framework/Method

Status: Active

ISAUnited’s six-stage lifecycle for doing security by design and change: Discover (goals, assets, constraints → seed DRM), Diagram (build CDMs: views, boundaries, interfaces), Decompose (TADA/DTM attack overlays), Decide (CECs/CIE trade-offs; choose controls), Deliver (implement; set TMC thresholds; define D-SSF gates), Demonstrate (V&V evidence; residual risk & LEP). Aligns teams on when to do which artifact and keeps work auditable.

IDA

ISAUnited Defensible Architecture Design Methodology

Category: Method

Status: Active

Threat-based, step-by-step method for security architecture: Pre-Design (problem/solution/BRD intake), Discovery (SARS submission; diagrams/DFDs; components; data classifications; integrations/APIs), Design Development—Concept (HLA; baseline controls) and Technical (DLA; threat & vulnerability analysis using Kill Chain + STRIDE; technical controls)—and Post-Design (handoff to Eng/Ops, continuous oversight, optional security standard artifact, close-out). Produces teachable artifacts (IDA Templates 01–07) and a repeatable, auditable path from requirements to defensible controls.

SbD

Security by Design

Category: Method

Status: Active

Lifecycle method that bakes security into every phase—Initiation → Analysis & Assessment → Design & Planning → Implementation & Integration → Testing & Validation → Deployment & Operation → Monitoring & Maintenance → Review & Improvement—guided by principles like least privilege, defense-in-depth, secure/fail-safe defaults, and privacy by design. Produces CDM views, TADA/DTM overlays, CEC/CIE-driven control choices, TMC thresholds, and DRM-tracked decisions with V&V under D-SSF—resulting in auditable, defensible designs.

SDO

Security Design Operations

Category: Method

Status: Active

An overarching, vendor-agnostic framework that operationalizes Security by Design across on-prem, cloud, and hybrid. Defines roles, rhythms, and workflows; aligns ERA ↔ SRA and engages TDA/CoE; drives delivery of HLA/DLA diagrams, threat & vulnerability analyses, baseline/technical control catalogs, and reports; embeds BAU oversight and stakeholder collaboration to streamline security architecture from concept to continuous improvement.

TBM

Tactical Battle Maps

Category: Model

Status: Active

Visual modeling framework that fuses CDM architecture views (trust boundaries, service chains, data paths) with TADA attack overlays to expose ingress/egress routes, east-west pivots, and choke points. Produces prioritized control placement & sequencing mapped to D10S, plus before/after diffs for change-driven work and evidence hooks for DRM/TMC (thresholds, SLAs). Applicable across Outside-In, Inside-Out, Data Core Ring, Process-Driven, Service Chain, and Change-Driven workflows. Not a product—teams generate TBMs using their own telemetry and platforms.

TMC

Technical Mathematical Computation

Category: Framework/Method

Status: Active

The math layer for engineering decisions—turn design claims into numbers, limits, and pass/fail criteria. Use TMC to: (1) set enforcement thresholds (e.g., rate limits, lockouts, anomaly scores), (2) size and capacity‑plan (RPS/QPS, bandwidth, storage growth), (3) budget reliability (SLO/SLI, availability “nines,” error budgets, MTTF/MTTR), and (4) select cryptographic parameters (key lengths, rotation cadence, security margins). TMC outputs quantitative requirements that plug into DRM decision records and V&V under D‑SSF, and it pairs with CDMs/CECs so control choices are defensible.
 

TRC

Technical Research Center

Category: ISAU's Non-profit Department

Status: Active

ISAUnited’s applied research arm that turns complex cybersecurity problems into defensible, engineering‑grade solutions. TRC develops frameworks and models, validates standards, and conducts AI & cybersecurity research, threat modeling & adversary simulation, and architecture reviews. It partners with private industry and government to deliver actionable outcomes and auditable evidence.

TADA

Technical Adversarial & Defensible Analysis

Category: Method

Status: Active

Attack-overlay method that projects adversary paths onto CDM diagrams to expose ingress/egress routes, east-west pivots, and exfil paths; outputs defensible control placement & sequencing mapped to D10S, testable acceptance criteria, and DRM-ready residual-risk notes, with thresholds quantified via TMC and optional TBM visuals.

Acronyms

Complimentary Content

Templates:

Threat Map Diagramming-Basic Stencils Package

Date:

2023

Become a member of ISAUnited and unlock our exclusive package, which includes our newest Defensible Architecture templates, including content for 'Threat and Vulnerability Analysis.'

Join Now

Threat Map Example.PNG

Explore our Library

Framework:

Implementing Security Controls

Date:

May 2024

ISAU-SecurityControls_coverpage.jpg

Framework:

Foundational Security Standards

Date:

April 2024

ISAU-FSS_coverpage2.PNG

Methodology:

Security by Design (SbD)

Date:

Mar 2024

SbD_Coverpage_pic.PNG

Framework:

Security Design Operations (SDO)

Date:

Jan 2024

SDO_coverpage_pic.PNG

Security Architecture Guide:

Threat Landscape Analysis - Practice Guide

Date:

Jan 2024

Threat_Landscape_pic.PNG

Frameworks:

Security Project Management

Date:

June 2023

Project_mgmt_coverpage_pic.PNG

Methodology:

ISAUnited Defensible Architecture (IDA) Design-Outline

Date:

2023

IDA_coverpage_pic2.PNG
Business Meeting

Join ISAUnited for the professional support and growth that you won't find anywhere else

ISAUnited gives you the best professional and technical resources.

bottom of page