SecurePath Wayne Howlett
Skill

Security Architecture

Trust boundaries, threat models, and verifiable controls.

Expert88%Evidence-first
Proficiency
6 capability3 tool2 working on
Capabilities
  • Trust boundaries & data flows
    ArchitectureWriteup
  • Security architecture decision records (ADRs)
    Writeup
  • Control mapping: threat → control → verification
    Writeup
  • Segmentation strategy (blast radius reduction)
    LabArchitecture
  • Secure defaults + defense-in-depth layering
    Project
  • Public-safe architecture diagrams & reviews
    Report
Tools
  • Diagrams: draw.io / Excalidraw
    Architecture
  • OWASP ASVS / SAMM (reference)
    Writeup
  • NIST-style control thinking (conceptual)
    Writeup
Working On
  • Architecture review templates + checklists (repeatable)
    Planned
  • PSAS documentation pack (charter → roadmap)
    Planned
Next steps

This page will grow into proof blocks (labs, writeups, artifacts) as you attach evidence.