Member-only story
A Digital Twin for Security Engineering
Turning a layered blueprints model into a secure protoype of your asset — with the help of inventory & detection tools
Imagine you’d have a digital representation of your assets, or your critical functions, that summarized all security-relevant aspects in one model.
Not a perfect reflection at all, but perfect enough to do security engineering. Imagine you could compliance-check that representation against security frameworks. Adjust it if your assets used different protocols, had different users, or there were new known vulnerabilities. And push the “apply” button so you could transform your security configurations of choice into reality.
Imagine you’d have a digital twin for security engineering.
Almost two years ago, I introduced the concept of Layered Blueprints, a lighthouse-shaped procedure and system model for security engineering.
You may or may not remember the last slide where I said I hoped we as a community would not build lonely security engineering lighthouses of our own, but entire skylines of lighthouses we could…