Skip to content

Instantly share code, notes, and snippets.

@jonathanhle
Created July 14, 2025 22:56
Show Gist options
  • Save jonathanhle/a94718771d3ab46c9f745cba729040ae to your computer and use it in GitHub Desktop.
Save jonathanhle/a94718771d3ab46c9f745cba729040ae to your computer and use it in GitHub Desktop.

Revisions

  1. jonathanhle created this gist Jul 14, 2025.
    93 changes: 93 additions & 0 deletions sos_reference.md
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,93 @@
    # Security Organization Structure (Reference Model)

    This document outlines a structured and scalable security organization suitable for a high-growth, cloud-native technology company with significant infrastructure, regulatory obligations, and user-facing product surface area.

    The organization is designed for ~1,000 employees and ~150–200 engineers, and it aims to cover the entire security lifecycle: from build-time controls to runtime detection, incident response, compliance, and onchain or product-specific risk.

    ---

    ## 🌲 Security Org Tree with Inline Role Scopes

    ### πŸ“Ž Notation

    Each role in the org tree is followed by a `(num)` indicating **recommended headcount for that function**.

    ```
    CSO/
    β”œβ”€β”€ Deputy-CSO-or-CISO (1) β€” Strategic leadership; separates governance from execution
    β”œβ”€β”€ Security-Engineering (30) β€” Builds and defends core systems: AppSec, Infra, IAM, Crypto
    β”‚ β”œβ”€β”€ Application-Security (7) β€” Secures code, libraries, pipelines, and partner teams
    β”‚ β”‚ β”œβ”€β”€ AppSec-Engineers (3) β€” SAST, secure reviews, bug triage, developer enablement
    β”‚ β”‚ β”œβ”€β”€ Threat-Modeling (1) β€” Architecture analysis and attack surface definition
    β”‚ β”‚ β”œβ”€β”€ Partner-Security (1) β€” Embedded security with product teams
    β”‚ β”‚ └── CI-CD-Security (2) β€” Protects the build pipeline, secret scanning, signing
    β”‚ β”‚ β”œβ”€β”€ Pipeline-Hardening (1) β€” Controls for Jenkins/GitHub/GitLab workflows
    β”‚ β”‚ └── Build-Signing-Tooling (1) β€” SLSA/Cosign, enforce artifact integrity
    β”‚ β”œβ”€β”€ Infrastructure-Security (10) β€” Hardens infra runtime: cloud, containers, K8s, network
    β”‚ β”‚ β”œβ”€β”€ Cloud-Security (2) β€” IAM boundaries, SCPs, IaC policies
    β”‚ β”‚ β”œβ”€β”€ Host-Hardening (1) β€” Hardened AMIs, OS security, EDR config
    β”‚ β”‚ β”œβ”€β”€ Network-Architecture (1) β€” Segmentation, egress policies, bastion/ingress rules
    β”‚ β”‚ β”œβ”€β”€ PKI-Engineering (2) β€” Internal CA, mTLS, cert rotation, SPIFFE/SPIRE
    β”‚ β”‚ β”‚ β”œβ”€β”€ Internal-CA (1) β€” Vault/StepCA management
    β”‚ β”‚ β”‚ └── Cert-Lifecycle-Automation(1) β€” Rotate, revoke, alert
    β”‚ β”‚ β”œβ”€β”€ Container-Security (2) β€” Image scanning and runtime protection
    β”‚ β”‚ β”‚ β”œβ”€β”€ Image-Scanning (1) β€” Build-time SBOM/Vuln checks
    β”‚ β”‚ β”‚ └── Runtime-Enforcement (1) β€” Admission controls, runtime constraints
    β”‚ β”‚ └── Kubernetes-Security (2) β€” Cluster policy, RBAC, and control plane protection
    β”‚ β”‚ β”œβ”€β”€ Admission-Control-Policy(1) β€” OPA, Kyverno, baseline guardrails
    β”‚ β”‚ └── K8s-RBAC-Hardening (1) β€” Audit roles, limit escalation
    β”‚ β”œβ”€β”€ IAM (4) β€” SSO, JIT, Secrets, Identity lifecycle across internal systems
    β”‚ β”‚ β”œβ”€β”€ Directory-Integration (1) β€” Okta/GWS/AAD SCIM connectors
    β”‚ β”‚ β”œβ”€β”€ RBAC/JIT-Access (1) β€” Role enforcement, TTL-based elevation
    β”‚ β”‚ └── Secrets-Management (2) β€” Vault, AWS KMS, secure workflows
    β”‚ └── Cryptography (4) β€” Custody keys, MPC infra, HSMs, threshold signing
    β”‚ β”œβ”€β”€ MPC-Platform (2) β€” Key orchestration and custody workflows
    β”‚ └── Key-Lifecycle/HSMs (2) β€” Signing infra, key splits, storage logic
    β”œβ”€β”€ Security-Operations (16) β€” Detect, respond, and automate against real threats
    β”‚ β”œβ”€β”€ Threat-Detection-and-Response (7) β€” Detection logic, SOAR, threat intel
    β”‚ β”‚ β”œβ”€β”€ Detection-Engineering (3) β€” SIEM pipelines, detections-as-code
    β”‚ β”‚ β”œβ”€β”€ Threat-Intel (2) β€” Actor mapping, TTPs, intel feeds
    β”‚ β”‚ └── SOAR-Automation (2) β€” Triage orchestration, auto-response playbooks
    β”‚ β”œβ”€β”€ Incident-Response (5) β€” On-call, IR plans, forensics, containment
    β”‚ β”‚ β”œβ”€β”€ On-Call-IR (2) β€” Triage, escalation, coordination
    β”‚ β”‚ β”œβ”€β”€ Forensics/RCA (2) β€” Artifact handling, root cause
    β”‚ β”‚ └── Tabletop-Exercises (1) β€” IR maturity, team drills
    β”‚ └── Insider-Threat (4) β€” DLP, high-risk access, behavioral monitoring
    β”‚ β”œβ”€β”€ DLP-Monitoring (2) β€” GWS/DLP, SaaS monitoring
    β”‚ └── Privileged-Access-Analytics (2) β€” Detection for abuse of access
    β”œβ”€β”€ GRC-and-Compliance (6) β€” Controls, policy, audit, vendor risk
    β”‚ β”œβ”€β”€ Audit-Readiness (2) β€” SOC2, ISO27001, SOX testing
    β”‚ β”œβ”€β”€ Risk/Control-Mapping (2) β€” NIST, CIS, CSA CCM frameworks
    β”‚ β”œβ”€β”€ Vendor-Risk (1) β€” Third-party assessments and onboarding checks
    β”‚ └── Policy-and-Awareness (1) β€” Internal policy docs and security training
    β”œβ”€β”€ Trust-and-Safety (5) β€” User trust, abuse prevention, fraud response
    β”‚ β”œβ”€β”€ ATO-Detection/Mitigation (2) β€” Detect account takeovers, enforce MFA challenges
    β”‚ β”œβ”€β”€ Abuse-Detection (1) β€” Scraping, spam, and API abuse
    β”‚ └── Customer-Escalation-Support (2) β€” Handles inbound security tickets w/ CX
    β”œβ”€β”€ Blockchain-Security (4) β€” Smart contract risk, onchain analytics, bridge security
    β”‚ β”œβ”€β”€ Smart-Contract-Review (2) β€” Manual audits, fuzzing, static analysis
    β”‚ β”œβ”€β”€ Protocol/Bridge-Analysis (1) β€” Risk scoring of L1/L2 chains and bridges
    β”‚ └── Onchain-Threat-Detection (1) β€” Real-time detection of illicit activity
    └── Security-Partners (3) β€” Embedded security engineers within core teams
    β”œβ”€β”€ Embedded-Infra-Squad (1) β€” Works with platform, DevOps, cloud teams
    β”œβ”€β”€ Embedded-Product-Squad (1) β€” Partners with feature teams on secure design
    └── Launch-Threat-Assessment (1) β€” Reviews high-risk launches and changes
    ```

    ---

    ## πŸ“Š Security Headcount vs Company Size (Recommended)

    | Company Size | Engineers | Recommended Security HC | % of Eng |
    |------------------|-----------|-------------------------|----------|
    | ~1,000 employees | 150–200 | 60–70 | 30–40% |
    | ~500 employees | 75–100 | 30–40 | 35–40% |
    | ~250 employees | 35–50 | 15–25 | 40–50% |

    ---

    ## πŸ“ˆ How to Use

    - **Phase hiring**: prioritize InfraSec, AppSec, TDR, IAM, GRC β†’ then scale out crypto/onchain/security partners
    - **Use the tree** to define ownership boundaries, accountability, team charters, and hiring plans
    - **Adapt to org size**: each sub-tree is independently scalable by company maturity