Skill
Security Architecture
Trust boundaries, threat models, and verifiable controls.
Expert88%Evidence-first
Proficiency
6 capability3 tool2 working on
Capabilities
- Trust boundaries & data flowsArchitectureWriteup
- Security architecture decision records (ADRs)Writeup
- Control mapping: threat → control → verificationWriteup
- Segmentation strategy (blast radius reduction)LabArchitecture
- Secure defaults + defense-in-depth layeringProject
- Public-safe architecture diagrams & reviewsReport
Tools
- Diagrams: draw.io / ExcalidrawArchitecture
- OWASP ASVS / SAMM (reference)Writeup
- NIST-style control thinking (conceptual)Writeup
Working On
- Architecture review templates + checklists (repeatable)Planned
- PSAS documentation pack (charter → roadmap)Planned
Next steps
This page will grow into proof blocks (labs, writeups, artifacts) as you attach evidence.