method

Security Roles and Responsibilities

Introduction

Effective security outcomes depend not just on what we do, but on who does it and how responsibilities are distributed. Many security initiatives fail despite solid technical foundations because:

The Peak Defence Method defines a flexible framework for security roles and responsibilities that:

  1. Scales appropriately with organizational size and complexity
  2. Balances centralization and distribution of security responsibilities
  3. Creates clear accountability while enabling broad participation
  4. Integrates security across functions rather than isolating it
  5. Evolves naturally as organizations mature

This chapter explains how to implement and evolve security roles and responsibilities across different organizational maturity levels, with particular attention to cross-functional integration. Rather than treating security as a specialized silo, we focus on creating effective interfaces between security and other organizational functions.

Maturity Level Framework

Security roles and responsibilities evolve significantly as organizations grow. The table below illustrates how key characteristics change across maturity levels:

Characteristic Level 1: Startup Level 2: Scale-up Level 3: Enterprise
Role Specialization Generalist with security responsibilities Dedicated security roles with some specialization Specialized security teams with defined domains
Organizational Position Part-time function within technical leadership Dedicated security function reporting to CTO/CIO Security organization with executive leadership (CISO)
Decision Authority Founders/technical leaders make security decisions Security leads with business approval Distributed governance with clear escalation paths
Accountability Model Informal, relationship-based Documented roles with basic RACI Comprehensive governance framework
Cross-Functional Integration Direct collaboration between team members Security representatives in key functions Federated security model with formal interfaces
Documentation Simple responsibility lists Role descriptions and RACI matrices Comprehensive security operating model
Boundary Artefacts Simple security guidelines all teams follow Security responsibility matrices and service agreements Enterprise security governance framework

Progression Indicators

When to move from Level 1 to Level 2:

When to move from Level 2 to Level 3:

Core Security Roles Framework

The Peak Defence Method defines four key security roles that exist at all maturity levels, though they manifest differently as organizations grow:

1. Security Leaders

Focus: Direction and guidance

2. Security Shapers

Focus: Problem definition and solution design

3. Security Implementers

Focus: Building security capabilities

4. Security Enablers

Focus: Supporting the security ecosystem

These roles exist across organizational functions and may be filled differently depending on maturity level. For example:

Cross-Functional Security Responsibilities

Security is inherently cross-functional. While primary security roles may reside in dedicated security teams as organizations grow, effective security requires participation from across the organization. The following table shows key security-related responsibilities for major organizational functions:

Function Security Responsibilities
Executive Leadership • Set security direction and risk appetite
• Allocate resources for security initiatives
• Hold ultimate accountability for security
• Communicate security importance to organization
Product/Engineering • Integrate security into development lifecycle
• Implement secure design and coding practices
• Validate security requirements implementation
• Balance security with product needs
Legal/Compliance • Identify regulatory security requirements
• Validate compliance of security controls
• Manage security-related contracts and agreements
• Support security incident legal response
IT/Operations • Implement and maintain security controls
• Monitor security operational metrics
• Respond to security alerts and incidents
• Manage security-related infrastructure
HR/People • Support security awareness and training
• Manage personnel security procedures
• Address security policy violations
• Support security culture development
Finance/Procurement • Evaluate security investment ROI
• Manage security budgets and spending
• Assess vendor security requirements
• Support security risk transfer (insurance)
Sales/Marketing • Communicate security capabilities to customers
• Gather security-related market requirements
• Support customer security assessments
• Align security messaging with capabilities
Customer Success/Support • Handle customer security concerns
• Escalate potential security issues
• Support customer security needs
• Provide feedback on security usability

This cross-functional integration evolves with organizational maturity but remains a fundamental aspect of the Peak Defence Method. Security cannot function effectively as an isolated domain - it requires active participation from across the organization.

Garage

Level 1: Startup Foundation

Target Organization: Startups and small organizations (5-50 employees)
Resources Required: Technical leader with security interest + team participation

At the startup level, security roles rarely exist as dedicated positions. Instead, security responsibilities are distributed among existing team members who take on security aspects alongside their primary roles.

Essential Security Roles

Technical Leader with Security Focus

Time Allocation: 5-20% of time on security
Responsibilities:

Cross-Functional Considerations:

Developers with Security Responsibilities

Time Allocation: 5-10% of development time
Responsibilities:

Cross-Functional Considerations:

Product Owner with Security Awareness

Time Allocation: 5-10% of product time
Responsibilities:

Cross-Functional Considerations:

Cross-Functional Security Participation

Time Allocation: As needed
Responsibilities:

Implementation Approach

For startups, implement security roles with these lightweight approaches:

  1. Designate a Security Point Person
    • Identify who has primary security responsibility
    • Allocate specific time for security work
    • Communicate this role to the whole team
    • Ensure they have access to necessary resources
  2. Create a Simple Responsibility Chart
    • List key security activities (e.g., code review, incident response)
    • Assign primary and backup owners
    • Share with the entire team
    • Review quarterly to keep current
  3. Establish Basic Security Communication
    • Create a dedicated security channel (Slack, Teams, etc.)
    • Hold monthly security check-ins with key team members
    • Include security topics in product and engineering meetings
    • Document security decisions in accessible locations
  4. Cross-Functional Integration
    • Include security as a regular topic in all-hands meetings
    • Create simple, role-specific security checklists
    • Ensure all team members know basic security expectations
    • Build security into existing processes rather than creating separate ones

Cross-Functional Boundary Artefacts

For effective security collaboration in startups, use these simple boundary Artefacts:

  1. Security Responsibility Chart
    • Simple table of security tasks and owners
    • Clear primary and backup responsibilities
    • Visible to all team members
    • Updated when roles or responsibilities change

Example:

Security Task Primary Owner Backup When
Code security reviews Ana (Dev) Tom (CTO) All PRs
Security incident response Tom (CTO) Elena (Dev) As needed
Customer security questions Maya (Product) Tom (CTO) As needed
Security requirements Tom (CTO) Maya (Product) New features
Security monitoring Elena (Dev) Tom (CTO) Daily
  1. Security Guidelines Document
    • Brief document with key security practices
    • Role-specific sections for different functions
    • Simple, jargon-free language
    • Practical examples and templates
  2. Security Decision Log
    • Record of key security decisions
    • Context and rationale for each decision
    • Accessible to all team members
    • Referenced when questions arise

Common Challenges and Solutions

Challenge Solution Cross-Functional Element
Security becoming a bottleneck Empower more team members to make routine security decisions Create simple decision guidelines different roles can follow
Security responsibilities falling through cracks Review the responsibility chart monthly; add missing items Discuss security responsibilities in cross-functional meetings
Limited security expertise Invest in targeted security training; use security-as-a-service Identify and leverage domain expertise across functions
Security vs speed tensions Set explicit security requirements early in development Include both product and engineering in security discussions
Inconsistent security practices Create simple, accessible security checklists Adapt checklists for different functional needs
Unclear security escalation paths Define and communicate when and how to escalate security concerns Ensure every function knows their escalation contacts

Signs You’ve Outgrown Level 1

Office

Level 2: Scale-up Enhancement

Target Organization: Growing organizations (50-500 employees)
Resources Required: Dedicated security lead + security representatives in key functions

As organizations grow, they need more formal security roles and clearer responsibilities. At this stage, dedicated security personnel emerge, though full security specialization remains limited.

Structured Security Roles

Security Lead/Manager

Time Allocation: Full-time security role
Responsibilities:

Cross-Functional Considerations:

Security Specialists

Time Allocation: Full-time security roles with different focuses
Responsibilities:

Cross-Functional Considerations:

Security Champions Network

Time Allocation: 10-20% of time on security responsibilities
Responsibilities:

Cross-Functional Considerations:

Function-Specific Security Responsibilities

Product/Engineering Security Roles

Responsibilities:

Legal/Compliance Security Roles

Responsibilities:

IT/Operations Security Roles

Responsibilities:

Implementation Approach

For growing organizations, implement security roles with these structured approaches:

  1. Establish Dedicated Security Function
    • Create formal security roles and descriptions
    • Define reporting lines and authority
    • Allocate appropriate budget and resources
    • Set clear expectations and objectives
  2. Develop Security RACI Matrix
    • Create comprehensive matrix for security activities
    • Define Responsible, Accountable, Consulted, and Informed roles
    • Include cross-functional responsibilities
    • Socialize across the organization
  3. Implement Security Champions Program
    • Select champions from key teams and functions
    • Provide targeted training and resources
    • Create regular coordination mechanisms
    • Recognize and reward champion contributions
  4. Establish Security Governance Framework
    • Create security steering committee with cross-functional representation
    • Develop formal escalation paths for security decisions
    • Implement regular security reporting
    • Define security decision authorities

Cross-Functional Boundary Artefacts

For effective security collaboration in scale-up organizations, use these structured boundary artefacts:

  1. Security RACI Matrix
    • Comprehensive matrix of security activities
    • Clear responsibilities across functions
    • Used for clarifying roles and accountability
    • Referenced when responsibility questions arise

Example Section:

Security Activity Security Team Engineering Product Legal Operations
Security architecture decisions A/R C C I C
Security requirements definition A/R C C C I
Security code implementation C A/R I I I
Security testing A/R C I I C
Security incident response A/R C I C C
Vendor security assessment A/R C C C C
Security policy development A/R C C C C

R = Responsible, A = Accountable, C = Consulted, I = Informed

  1. Security Service Catalog
    • Documented security services offered to the organization
    • Service descriptions, delivery model, and SLAs
    • Function-specific sections and use cases
    • Clear process for requesting security services
  2. Security Decision Framework
    • Documented security decision authorities
    • Approval thresholds and escalation criteria
    • Templates for security decision requests
    • Clear process for expedited decisions

Function-Specific Security Interfaces

Establish formal interfaces between security and other organizational functions:

Security-Product Interface

Security-Engineering Interface

Security-Operations Interface

Common Challenges and Solutions

Challenge Solution Cross-Functional Element
Security team becoming isolated Establish formal interfaces with other functions Create cross-functional security forum
Unclear decision authorities Develop and document security decision framework Include key stakeholders in framework development
Security bottlenecks in processes Delegate routine decisions to trained security champions Create decision guides for different functions
Inconsistent security practices across teams Create function-specific security standards Develop standards collaboratively with affected functions
Security receiving late-stage requests Integrate security earlier into planning processes Create function-specific engagement models
Overloaded security resources Implement security service tiers and prioritization Base priorities on cross-functional business impact
Resistance to security requirements Involve affected functions in requirement development Create security-business alignment workshops

Signs You’ve Outgrown Level 2

Buildings

Level 3: Enterprise Optimization

Target Organization: Large organizations (500+ employees)
Resources Required: Security leadership team + specialized security functions + formal governance

Enterprise organizations require comprehensive security roles and responsibilities with formal governance structures. At this level, security becomes a specialized organization with executive leadership and clear interfaces with other business functions.

Comprehensive Security Roles

Chief Information Security Officer (CISO)

Time Allocation: Full-time executive security role
Responsibilities:

Cross-Functional Considerations:

Security Leadership Team

Time Allocation: Full-time security leadership roles
Responsibilities:

Example Security Leadership Roles:

Cross-Functional Considerations:

Specialized Security Teams

Time Allocation: Full-time specialized security roles
Responsibilities:

Example Specialized Teams:

Cross-Functional Considerations:

Federated Security Model

Time Allocation: Varies by role and function
Responsibilities:

Example Federated Security Roles:

Cross-Functional Considerations:

Security Governance Framework

Enterprise organizations need formal security governance:

  1. Executive Security Committee
    • Executive-level governance body
    • Strategic security direction and oversight
    • Enterprise risk acceptance decisions
    • Resource allocation and prioritization
    • Cross-functional executive representation
  2. Security Steering Committee
    • Senior management security governance
    • Tactical security direction and coordination
    • Security initiative oversight
    • Cross-functional management representation
    • Regular (monthly/quarterly) cadence
  3. Security Working Groups
    • Domain-specific security governance
    • Specialized security topics and initiatives
    • Technical and process-level coordination
    • Subject matter expert participation
    • As-needed or regular cadence
  4. Security Decision Framework
    • Documented decision authorities at different levels
    • Clear escalation criteria and paths
    • Formal decision logging and tracking
    • Risk acceptance processes
    • Emergency decision procedures

Cross-Functional Boundary Artefact

For effective security collaboration in enterprise organizations, use these comprehensive boundary artefacts:

  1. Enterprise Security Operating Model
    • Comprehensive security roles and responsibilities
    • Security organizational structure and governance
    • Security service delivery model
    • Cross-functional interfaces and touchpoints
    • Security performance metrics and reporting

Example Section:


Infrastructure Security Services

Service: Cloud Security Architecture Review

Description: Architectural review of cloud infrastructure designs for security and compliance

Service Owner: Cloud Security Architecture Team Primary Customers: Cloud Engineering, Application Development, DevOps Service Level: Standard (5 business day turnaround), Expedited (2 business day turnaround)

Process:

  1. Requestor submits design documents using Cloud Security Review template
  2. Cloud Security Architect assigned within 1 business day
  3. Initial assessment and clarification questions within 2 business days
  4. Final review delivered within SLA timeframe
  5. Optional follow-up consultation available

Escalation Path:

Performance Metrics:

  1. Enterprise Security Responsibility Matrix
    • Comprehensive RACI across all security domains
    • Function-specific security responsibilities
    • Governance body roles and authorities
    • Security service boundaries and ownership
    • Escalation and exception processes
  2. Security Engagement Model
    • Documented interfaces between security and other functions
    • When and how to engage security in different processes
    • Templates and artifacts for cross-functional security work
    • Security service request and delivery processes
    • Security decision request and approval workflows

Function-Specific Security Integration

Implement structured security integration with business functions:

Business Unit Security Integration

Security-Technology Integration

Security-Legal/Compliance Integration

Security-Operations Integration

Common Challenges and Solutions

Challenge Solution Cross-Functional Element
Security organizational complexity Implement clear security operating model Create function-specific interfaces and touchpoints
Balancing centralized and decentralized security Develop federation model with clear accountabilities Align operating model with organizational culture
Governance overhead slowing decisions Implement tiered governance with appropriate delegation Include key stakeholders in governance design
Inconsistent security across business units Create balanced control framework with local flexibility Develop appropriate security metrics across functions
Security resource allocation conflicts Implement formal security investment governance Base investment decisions on business risk impact
Complex security-business alignment Develop business-aligned security strategy Create function-specific value propositions
Security becoming bureaucratic Balance governance with service orientation Design processes collaboratively with affected functions

Implementing Roles and Responsibilities Across Planning Horizons

Security roles and responsibilities operate across the planning horizons we discussed in earlier chapters. Different horizons require different role involvement and responsibility patterns.

Lifetime Horizon Responsibilities

At the Lifetime Horizon (years), responsibilities focus on strategic direction:

Role Primary Responsibilities Cross-Functional Considerations
Security Strategists • Set security vision and principles
• Define enterprise security architecture
• Establish risk tolerance framework
• Align with business strategy and vision
• Integrate with enterprise architecture
• Consider regulatory long-term evolution
Security Shapers • Architect security capabilities
• Define security technology strategy
• Create security roadmaps
• Coordinate with technology strategy
• Align with product long-term vision
• Consider operational sustainability
Security Implementers • Provide implementation feasibility input
• Validate architectural assumptions
• Identify long-term implementation challenges
• Work with engineering on technical feasibility
• Consider operational maintenance needs
• Validate with implementation expertise
Security Enablers • Provide business context and constraints
• Represent stakeholder long-term needs
• Support strategic security alignment
• Translate business strategy needs to security
• Advocate for security in strategic planning
• Enable cross-functional strategic alignment

Yearly Horizon Responsibilities

At the Yearly Horizon (12 months), responsibilities focus on capability development:

Role Primary Responsibilities Cross-Functional Considerations
Security Strategists • Prioritize security investments
• Allocate resources for security initiatives
• Set annual security objectives
• Align with annual business planning
• Coordinate with budgeting processes
• Integrate with organizational objectives
Security Shapers • Shape major security initiatives
• Define security capability requirements
• Create security program structure
• Work with project/product planning
• Coordinate with technology roadmaps
• Align with compliance calendars
Security Implementers • Plan implementation capacity
• Identify implementation dependencies
• Develop implementation roadmaps
• Coordinate with engineering capacity planning
• Align with product/project schedules
• Consider operational implementation needs
Security Enablers • Provide domain expertise for planning
• Represent function-specific requirements
• Support resource allocation decisions
• Ensure security plans align with functional plans
• Advocate for security resource needs
• Enable function-specific security planning

Quarterly Horizon Responsibilities

At the Quarterly Horizon (3 months), responsibilities focus on initiative management:

Role Primary Responsibilities Cross-Functional Considerations
Security Strategists • Make betting decisions on shaped work
• Review initiative progress
• Address escalated issues
• Align with quarterly business reviews
• Coordinate with product/project governance
• Integrate with resource management
Security Shapers • Shape specific security initiatives
• Define initiative scope and appetite
• Create security pitches
• Work with product/project managers
• Coordinate with engineering leadership
• Align with quarterly planning cycles
Security Implementers • Provide implementation expertise
• Plan implementation approach
• Identify implementation risks
• Coordinate with delivery teams
• Align with engineering practices
• Consider operational requirements
Security Enablers • Contribute domain expertise to shaping
• Identify cross-functional dependencies
• Support initiative coordination
• Ensure initiatives align with functional needs
• Advocate for security in planning processes
• Enable cross-functional coordination

Cycle Horizon Responsibilities

At the Cycle Horizon (6 weeks), responsibilities focus on implementation:

Role Primary Responsibilities Cross-Functional Considerations
Security Strategists • Monitor implementation progress
• Address strategic blockers
• Evaluate implementation success
• Coordinate with delivery oversight
• Align with release management
• Integrate with operational readiness
Security Shapers • Support implementation teams
• Clarify shaped work as needed
• Help address discovered challenges
• Work with product owners/managers
• Coordinate with technical leadership
• Align with quality assurance processes
Security Implementers • Implement security controls
• Track and communicate progress
• Make tactical implementation decisions
• Coordinate with development teams
• Align with testing and validation
• Consider operational deployment needs
Security Enablers • Provide domain-specific support
• Help address functional dependencies
• Support implementation validation
• Ensure implementation meets functional needs
• Advocate for security quality
• Enable functional acceptance and adoption

Cross-Functional Security Responsibility Patterns

Certain cross-functional patterns emerge across maturity levels. These patterns help organizations establish effective security responsibilities that span traditional functional boundaries.

1. Security Decision-Making Pattern

How security decisions should be made across functions:

Maturity Level Pattern Implementation
Level 1: Startup • Simple decision rights documented
• Key security decisions made by technical leadership with founder input
• Direct communication about security trade-offs
Level 2: Scale-up • Documented decision framework
• Security team makes technical decisions, business approves risk acceptance
• Formal escalation process for conflicts
Level 3: Enterprise • Comprehensive governance framework
• Tiered decision authorities with clear boundaries
• Formal risk acceptance process with appropriate delegations

Cross-Function Considerations:

2. Security Service Delivery Pattern

How security services should be delivered across the organization:

Maturity Level Pattern Implementation
Level 1: Startup • Security assistance provided as needed
• Direct requests to security-responsible person
• Informal prioritization based on impact
Level 2: Scale-up • Defined security services with clear owners
• Formal request and prioritization process
• Basic service levels and expectations
Level 3: Enterprise • Comprehensive security service catalog
• Tiered service levels with clear SLAs
• Resource allocation aligned with business priorities

Cross-Function Considerations:

3. Security Accountability Distribution Pattern

How security accountability should be distributed across functions:

Maturity Level Pattern Implementation
Level 1: Startup • Security accountability held primarily by technical leaders
• Basic security responsibilities for all team members
• Direct oversight of security activities
Level 2: Scale-up • Primary accountability with security team
• Functional leaders accountable for security in their domains
• Security champions as local security representatives
Level 3: Enterprise • Tiered accountability model
• CISO accountable for enterprise security posture
• Business unit leaders accountable for security in their areas
• Federated security model with clear boundaries

Cross-Function Considerations:

4. Security Knowledge Distribution Pattern

How security knowledge should flow across the organization:

Maturity Level Pattern Implementation
Level 1: Startup • Direct sharing of security knowledge
• Just-in-time security guidance
• Emphasis on practical application
Level 2: Scale-up • Structured security training program
• Function-specific security guidance
• Security champions as knowledge conduits
Level 3: Enterprise • Comprehensive security knowledge management
• Role-based security education
• Multiple knowledge delivery channels
• Specialized communities of practice

Cross-Function Considerations:

Boundary Artefacts for Cross-Functional Security Roles

Effective cross-functional security roles require shared artifacts that create alignment across organizational boundaries. These boundary artefacts should evolve with organizational maturity:

Garage

Level 1: Essential Boundary Artefacts for Startups

  1. Security Responsibility Chart
    • Simple table of security tasks and owners
    • Clear primary and backup responsibilities
    • Visible to all team members
    • Updated when roles or responsibilities change
  2. Security Decision Guidelines
    • Brief document outlining who makes which security decisions
    • Examples of common security decisions
    • Simple escalation process for unusual situations
    • Accessible to everyone in the organization
  3. Basic Security Checklist
    • Simple checklist of security responsibilities by role
    • Focus on most critical security activities
    • Practical guidance without security jargon
    • Used during relevant processes (development, release, etc.)

Office

Level 2: Structured Boundary Artefacts for Scale-ups

  1. Security RACI Matrix
    • Comprehensive matrix of security activities
    • Clear responsibilities across functions
    • Used for clarifying roles and accountability
    • Referenced when responsibility questions arise
  2. Security Service Catalog
    • Documented security services offered to the organization
    • Service descriptions, delivery model, and SLAs
    • Function-specific sections and use cases
    • Clear process for requesting security services
  3. Security Champions Charter
    • Clear definition of security champion role
    • Responsibilities, expectations, and time commitment
    • Relationship with central security team
    • Support and resources provided to champions

Buildings

Level 3: Sophisticated Boundary Artefacts for Enterprises

  1. Enterprise Security Operating Model
    • Comprehensive documentation of security organization
    • Clear roles, responsibilities, and interfaces
    • Governance structures and decision authorities
    • Service delivery models and performance metrics
    • Integrated with enterprise operating model
  2. Security Governance Framework
    • Formal documentation of security governance bodies
    • Decision authorities and escalation paths
    • Meeting cadences and membership
    • Reporting and oversight mechanisms
    • Cross-functional representation requirements
  3. Federated Security Model
    • Documentation of centralized vs. decentralized responsibilities
    • Interface definitions between security organization and business units
    • Service boundaries and accountability model
    • Resource allocation and reporting relationships
    • Performance measurement and management