Security approaches often fail not because of poor implementation, but because they’re built on flawed assumptions about the nature of security itself. The Peak Defence Method is founded on a different perspective — one that acknowledges the inherent complexity and unpredictability of modern systems.
This chapter explains the philosophical foundation and core principles that guide our approach across organizations of all sizes and maturity levels. These principles inform every aspect of the methodology, from how we shape work to how we implement security controls and measure security effectiveness.
Security is inherently cross-functional - it touches every aspect of an organization and requires coordination across traditional functional boundaries. The principles in this chapter don’t just guide the security team; they provide a common language and framework for all organizational functions to contribute to security outcomes effectively.
The application of core principles evolves as organizations grow in size and capability. The table below illustrates how key characteristics change across maturity levels:
| Characteristic | Level 1: Startup | Level 2: Scale-up | Level 3: Enterprise |
|---|---|---|---|
| Method Integration | Implicit, pragmatic application | Explicit, structured application | Comprehensive, systematic application |
| Resilience Focus | Basic recovery capabilities | Balanced prevention and adaptation | Sophisticated resilience architecture |
| People-Process-Technology Balance | Informal, people-centric | Structured, balanced approach | Formal, comprehensive integration |
| Cross-Functional Coordination | Direct collaboration between team members | Designated security liaisons in key functions | Formalized coordination framework with clear interfaces |
| Documentation | Simple principles statement | Detailed principles documentation | Enterprise security architecture |
“Anything that can go wrong, will go wrong” - Edward A. Murphy Jr.
Murphy’s Law serves as our philosophical foundation—a reminder that in any sufficiently complex system, unexpected events are inevitable. Rather than viewing this as pessimism, we see it as a profound insight that should guide how we approach security.
This perspective fundamentally changes our approach to security:
| Traditional Security | Resilience-Oriented Security |
|---|---|
| Focus on preventing all failures | Design for inevitable failures |
| Create rigid, controlled environments | Build adaptive, responsive systems |
| Minimize risk through strict controls | Manage risk through adaptive capacity |
| React to security failures | Anticipate and prepare for failures |
| Measure success by incidents prevented | Measure success by resilience to incidents |
For startups and small organizations (5-50 employees):
Focus on basics with resilience in mind
Practical application:
Example: A small e-commerce startup implements password authentication but also creates a simple account recovery process for when users forget passwords or accounts get compromised. They test this recovery process monthly to ensure it works when needed.
Cross-Functional Considerations:
At the startup level, cross-functional coordination happens organically through direct communication:
Example Boundary Artefact: A one-page “Security Incident Checklist” that defines roles for everyone during a security incident, regardless of their primary function.
For growing organizations (50-500 employees):
Develop systematic resilience capabilities
Practical application:
Example: A growing FinTech company implements a dual-layer authentication system, with the explicit understanding that the primary method may fail. They create dashboards to monitor authentication success rates, establish alerts for unusual patterns, and document procedures for rapidly switching to backup authentication methods when needed.
Cross-Functional Considerations:
As the organization grows, more structured cross-functional coordination becomes necessary:
Example Boundary Artefact:
For large organizations (500+ employees):
Architect comprehensive resilience
Practical application:
Example: A large healthcare enterprise implements a zero trust architecture with the explicit understanding that some controls will fail. They create layered detection capabilities, develop response procedures for different compromise scenarios, establish formal learning processes after security events, and maintain a security control effectiveness dashboard with real-time adaptation metrics.
Cross-Functional Considerations:
Enterprise organizations require systematic approaches to cross-functional security coordination:
Example Boundary Artefacts:
| Challenge | Level 1 Solution | Level 2 Solution | Level 3 Solution |
|---|---|---|---|
| Balancing prevention and resilience | Focus resources on recovery for critical systems | Develop tiered approach based on asset value | Implement formal resilience architecture framework |
| Convincing stakeholders | Use concrete examples of past security failures | Present cost-benefit analysis of resilience vs. prevention | Develop comprehensive risk management framework |
| Limited resources | Prioritize controls that provide both prevention and detection | Implement phased approach to building resilience | Develop risk-based resource allocation model |
| Complex technology landscape | Focus on critical system resilience first | Develop resilience patterns for common technologies | Create technology-specific resilience architectures |
| Functional silos | Regular all-hands security updates | Security champions in each function | Enterprise security operating model with clear interfaces |
Security effectiveness requires balance across these three dimensions. This balance looks different at each organizational maturity level but remains a critical framework for security decisions.
Humans remain both the greatest strength and the greatest vulnerability in security systems. Their role evolves as organizations grow:
Everyone shares security responsibility
Key practices:
Example: At a 15-person software startup, one developer takes special interest in security and spends 20% of their time on security tasks. The CEO personally leads a monthly security discussion at all-hands meetings, and everyone follows a simple set of security guidelines that focus on the most important behaviors.
Dedicated security roles emerge
Key practices:
Example: A 90-person technology company has a three-person security team led by a Security Director. Each department has a designated security champion who receives additional training. New employees complete security orientation, and teams receive security briefings relevant to their specific work.
Specialized security organization
Key practices:
Example: A global enterprise with 5,000 employees has a CISO-led security organization with specialized teams for application security, infrastructure security, security operations, and governance/compliance. Security responsibilities are clearly defined in formal policies, security objectives appear in executive performance goals, and the organization maintains a comprehensive security training program with role-specific requirements.
Processes create consistency and repeatability, but poorly designed processes become bureaucratic obstacles. The appropriate level of process formality depends on organizational size and complexity:
Simple, focused processes
Key processes:
Example: A small SaaS provider documents their most critical security processes: how to onboard/offboard employees securely, how to respond to potential account compromise, and how to securely share client credentials. They keep these processes as one-page checklists that anyone can easily follow.
Structured but adaptable processes
Key processes:
Example: A growing financial services company implements formal security processes based on NIST guidelines, but adapts them to fit their specific needs and culture. They document these processes in their internal knowledge base, conduct quarterly reviews to ensure they remain effective, and collect metrics on process performance.
Comprehensive process framework
Key processes:
Example: A large legal tech provider implements a comprehensive security process framework aligned with multiple regulatory requirements. Security processes integrate with enterprise governance, automate routine security activities, and include formal metrics and improvement cycles. Process maturity assessments occur annually with continuous monitoring of process effectiveness.
Technology provides essential capabilities but must be thoughtfully integrated in ways appropriate to organizational size and complexity:
Essential security tools
Key technologies:
Example: A small e-commerce startup leverages their cloud provider’s built-in security features, implements multi-factor authentication through a managed identity provider, and uses a combination of simple monitoring tools to maintain visibility into their environment. They focus on solutions that provide maximum security value with minimal maintenance overhead.
Integrated security technology stack
Key technologies:
Example: A mid-sized software company builds an integrated security stack with centralized logging and monitoring, automated vulnerability scanning, and cloud security management tools. They carefully select technologies that work well together, implement automation for routine security tasks, and maintain appropriate balance between security and operational efficiency.
Enterprise security architecture
Key technologies:
Example: A global financial institution implements an enterprise security architecture with specialized technologies for different security domains, all integrated through a central orchestration platform. They maintain a formal technology lifecycle management process, measure technology effectiveness through comprehensive metrics, and continuously evaluate emerging security technologies against their strategic needs.
The intersection of People, Process, and Technology creates a balanced security approach—but that balance looks different at each maturity level:
Cross-Functional Integration:
Cross-Functional Integration:
Cross-Functional Integration:
| Challenge | Level 1 Solution | Level 2 Solution | Level 3 Solution |
|---|---|---|---|
| Over-reliance on tools | Focus on people skills and awareness | Implement balanced security program | Develop comprehensive security architecture |
| Process bureaucracy | Keep processes lightweight and focused | Design for appropriate formality | Implement efficiency metrics for processes |
| Skill gaps | Leverage managed services | Develop targeted training | Create comprehensive security career paths |
| Disconnected elements | Maintain regular security discussions | Implement coordination mechanisms | Create formal governance frameworks |
| Functional silos | Regular all-hands security updates | Security champions in each function | Enterprise security operating model with clear interfaces |
The core principles of the Peak Defence Method directly inform how security activities are conducted at each maturity level:
Shaping security work
Betting on security initiatives
Building security capabilities
Shaping security work
Betting on security initiatives
Building security capabilities
Shaping security work
Betting on security initiatives
Building security capabilities
Effective security requires translating core principles to different functional contexts:
For Engineering/Product
For Business/Operations
For Legal/Compliance
For Engineering/Product
For Business/Operations
For Legal/Compliance
For Engineering/Product
For Business/Operations
For Legal/Compliance
Use these questions to assess your organization’s alignment with core principles:
Understanding the Core Philosophy is the foundation for successfully implementing the Peak Defence Method. From here, you can: