Skip to content

From mental model to security model

Introduction

A mental model is a structured way of thinking that enables systematic analysis and informed decision-making. It is especially important in analysis-driven roles. For a security engineer, that mental model is a disciplined approach to understanding systems and evaluating their risks.


The security mental model

A security engineer’s mental model has two complementary parts:

  • Architecture model — focuses on how the system is designed and operates
  • Security model — focuses on how the system can fail or be compromised

Together they provide both clarity and critical assessment.


Architecture model

Objectives and purpose

The architecture model is the foundation of any security review. Its goal is a clear, simplified, and accurate picture of the system: strip unnecessary noise and keep what matters for trust and failure modes.

A complete picture includes:

  • System purpose and business motivation
  • Core functionality and workflows
  • Key components and their responsibilities
  • Relationships across components (horizontal and vertical)

Architectural understanding

To build the architecture model, a security engineer should:

  • Gather information about project goals and intended outcomes
  • Understand the main logic, functional workflows, and end-to-end data flows
  • Identify architectural patterns and system design (for example, distributed systems, pipelines, services)

Components and relationships

Decompose the system into fundamental building blocks, including:

  • Compute — services, jobs, runtimes, notebooks
  • Storage — databases, object storage, data lakes
  • Identity — IAM roles, users, service principals
  • Networking — VPCs, subnets, endpoints
  • External integrations — third-party systems, shared platforms

Key activities:

  • Map dependencies between components
  • Understand communication patterns (synchronous vs asynchronous)
  • Identify trust relationships between services

Security boundaries

Define and analyze security boundaries, such as:

  • Network boundaries (for example, VPCs, private vs public zones)
  • Account or tenant boundaries
  • Identity domains and trust zones

For each boundary:

  • Identify what crosses the boundary
  • Document protocols, APIs, and interfaces
  • Record the type and sensitivity of data exchanged

Data flow and process flow

Within and across boundaries, model two flows:

Data flow

  • How data is created, transformed, stored, and transmitted
  • Where sensitive data resides and moves

Process / control flow

  • How execution progresses through the system
  • Triggers, orchestration, and dependencies

This step ties behavior to data movement so reviews are not only diagram-deep but risk-relevant.


Security model

Purpose and mindset

Once the architecture model is in place, the security model is built on top of it.

Unlike the architecture model (which emphasizes understanding), the security model emphasizes adversarial thinking. It evaluates:

  • Where the system can be broken
  • How trust can be abused
  • How components can be repurposed or misused
  • What unintended side effects may arise

Security structure discovery

Systematically analyze the system across two dimensions: horizontal and vertical.

Horizontal analysis

Horizontal analysis looks at interactions between components:

  • Identify communication paths (APIs, protocols, messaging)
  • Focus on traffic across and within security boundaries

Verify:

  • What data is exchanged
  • How often it is exchanged
  • The sensitivity and classification of that data

That discipline keeps exposure and lateral movement from being hand-waved away.

Vertical analysis

Vertical analysis decomposes each communication into three layers:

  • Protocol — how communication occurs
  • Authentication — who is making the request
  • Authorization — what actions are permitted

Layered validation helps ensure interactions are secure, not only functional.

Threat modeling

Apply structured threat modeling (for example STRIDE) to simulate adversarial behavior.

Typical STRIDE categories to walk through:

  • Spoofing
  • Tampering
  • Repudiation
  • Information disclosure
  • Denial of service
  • Elevation of privilege

The objective is to test robustness, resilience, and defensive behavior—not to collect labels for a slide deck.


Conclusion

The security mental model—architecture model plus security model—is a practical framework for security analysis.

  • The architecture model deepens understanding by simplifying complexity and surfacing the elements that actually carry risk.
  • The security model applies adversarial thinking to expose weaknesses and misuse paths.

Together they help a security engineer move past surface-level reactions and deliver a structured, thorough, and defensible assessment.