Lab 20: Capstone — Enterprise Security Architecture

Time: 60 minutes | Level: Architect | Docker: docker run -it --rm zchencow/innozverse-cybersec:latest bash


🎯 Objective

Design and validate a complete Enterprise Security Architecture that integrates all 19 previous labs into a unified, measurable security program. You will build and run Python3 models for every major security domain — SOC, Zero Trust, PKI, DevSecOps, Compliance, Vulnerability Management, Incident Response — and generate a full JSON architecture report with risk scores and a remediation roadmap.


📚 Background

Enterprise security is not a collection of point solutions — it is an interconnected programme governed by risk appetite, compliance obligations, and continuous improvement metrics. A mature architecture ties together:

  • Operational layers — SOC, SIEM/SOAR, threat intelligence, incident response

  • Architectural controls — Zero Trust, PKI, micro-segmentation, IAM

  • Engineering controls — DevSecOps pipelines, container security, IaC scanning

  • Governance controls — compliance frameworks, vulnerability management SLAs, risk quantification

This capstone integrates concepts from every previous lab: SOC (Lab 01–02), TIP (Lab 03), Zero Trust (Lab 04), Cloud Security (Lab 05), IAM (Lab 06), PKI (Lab 07), SOAR (Lab 08), Container Security (Lab 09), DevSecOps (Lab 10), IR (Lab 11), Threat Hunting (Lab 12), Red Team (Lab 13), BCP/DR (Lab 14), Compliance (Lab 15), Vuln Mgmt (Lab 16), DLP (Lab 17), Network Security (Lab 18), and Risk Quantification (Lab 19).


Step 1 — SOC Design: 3-Tier Operations Centre

Architecture

A modern enterprise SOC operates across three analyst tiers plus a dedicated Threat Intelligence function:

SIEM + SOAR Integration:

  • Elastic SIEM ingests logs → Sigma rules fire alerts → SOAR orchestrates response

  • Automated playbooks handle: phishing triage, IOC enrichment, ticket creation, containment

Key Metrics Dashboard:

Metric
Target
Critical Threshold

MTTD (Mean Time to Detect)

< 4 hours

> 8 hours = escalate

MTTR (Mean Time to Respond)

< 24 hours

> 72 hours = incident

False Positive Rate

< 20%

> 40% = tune rules

Analyst Utilisation

70–85%

> 90% = hire

Python3 — SOC Capacity Calculator

Run it:

📸 Verified Output:

💡 Tip: If your alert volume exceeds L1 capacity, analysts become bottlenecks and MTTD climbs. Auto-close low-fidelity alerts via SOAR to maintain headroom. Aim for 70% analyst utilisation — the 30% buffer handles alert spikes.


Step 2 — Zero Trust Network: PEP/PDP/PA Model

Architecture

Zero Trust (NIST SP 800-207) replaces perimeter trust with continuous, context-aware access decisions:

Micro-Segmentation Rules:

  • Finance zone: trust score ≥ 90, MFA required, managed device required

  • Engineering zone: trust score ≥ 70, MFA required

  • General zone: trust score ≥ 50

mTLS for service-to-service: All internal APIs use mutual TLS with SPIFFE/SPIRE-issued SVIDs (short-lived, no long-term secrets).

Identity-centric access (OIDC): Users authenticate via OIDC → JWT claims feed trust score calculation.

Python3 — Zero Trust Policy Engine

Run it:

📸 Verified Output:

💡 Tip: Never hardcode trust decisions based on IP address or network location alone. A Zero Trust score must include at minimum: identity assertion (authn), device posture, and context signal (location/time). Missing any one leg weakens the model.


Step 3 — PKI Infrastructure: 3-Tier CA Hierarchy

Architecture

Certificate Profiles:

Profile
Key Usage
Validity
Auto-renew

TLS Server

Digital Sig, Key Enciph

90 days

ACME/certbot

Client Auth

Digital Sig

1 year

SCEP/EST

Code Signing

Digital Sig

3 years

Manual

SVID (mTLS)

Digital Sig

1 hour

SPIRE

ACME auto-renewal: Certificate lifetime ≤ 90 days; renew at 2/3 of lifetime using ACME (Let's Encrypt protocol). Monitor expiry with Prometheus ssl_expiry_seconds metric.

Python3 — Certificate Chain Validator

Run it:

📸 Verified Output:

💡 Tip: The offline Root CA should never touch a network. Store it on an HSM or encrypted USB. The only time you power it on is to sign the Intermediate CA certificate (a rare, ceremony-worthy event). OCSP stapling moves revocation checking to the server, eliminating privacy leaks from client-to-OCSP-responder traffic.


Step 4 — DevSecOps Pipeline: Security Gate

Pipeline Architecture

Stage thresholds:

Stage
Tool
Fail Threshold

SAST

bandit

Any critical finding

DAST

OWASP ZAP

> 2 high findings

SCA/SBOM

syft + grype

> 5 critical CVEs

Container Scan

trivy

> 3 critical CVEs

IaC Scan

checkov

> 10 failures

Python3 — Pipeline Stage Simulator

Run it:

📸 Verified Output:

💡 Tip: Fail SAST at zero critical findings — security bugs found in CI are 100× cheaper to fix than in production. Treat the security gate as a binary: all stages must pass. Use suppression files (.trivyignore, bandit.yaml) sparingly and with mandatory review tickets.


Step 5 — Compliance Mapping: Multi-Framework Gap Analysis

Framework Coverage Matrix

Domain
ISO 27001
SOC 2 Type II
NIST CSF 2.0
PCI DSS v4.0

Access Control

A.5.15–A.5.18

CC6.1–CC6.3

PR.AA

Req 7–8

Cryptography

A.8.24

CC6.7

PR.DS

Req 3–4

Incident Response

A.5.26

CC7.3–CC7.5

RS.MA

Req 12.10

Vulnerability Mgmt

A.8.8

CC7.1

ID.RA

Req 6

Logging & Monitoring

A.8.15–A.8.16

CC7.2

DE.CM

Req 10

Supply Chain

A.5.19–A.5.22

CC9.2

GV.SC

Req 12.8

Python3 — Compliance Gap Analyser

Run it:

📸 Verified Output:

💡 Tip: Map controls once, satisfy many. Most ISO 27001 controls overlap with NIST CSF and SOC 2 TSCs — a single control evidence artefact (e.g., a firewall change management procedure) can satisfy all three frameworks. Use a GRC platform (ServiceNow, Vanta, Drata) to link evidence to multiple frameworks automatically.


Step 6 — Vulnerability Management: CVSS + EPSS Priority Queue

Prioritisation Model

Traditional CVSS-only scoring leads to "patch treadmill" — hundreds of Critical findings, no time to prioritise. EPSS (Exploit Prediction Scoring System) provides the probability a CVE will be exploited in the wild within 30 days:

Exception workflow: Exceptions require CISO approval, business justification, compensating controls, and a review date (max 90-day extension).

Python3 — CVSS v3.1 Calculator + Priority Queue

Run it:

📸 Verified Output:

💡 Tip: A CVSS 9.8 with EPSS 0.01 is less urgent than a CVSS 7.5 with EPSS 0.85 — the latter is actively being exploited. EPSS scores update daily; integrate the EPSS API into your vulnerability scanner to get fresh probabilities automatically.


Step 7 — Incident Response: Ransomware Playbook

IR Framework (NIST SP 800-61 Rev 3)

RACI Matrix — Ransomware Incident:

Activity
IR Lead
SOC Manager
Network
Legal
CISO

Declare incident

R

A

I

I

I

Network isolation

R

A

C

I

I

Evidence collection

R

C

C

I

I

Executive comms

I

I

I

C

R/A

Ransom decision

I

I

I

C

R/A

Recovery approval

C

C

R

I

A

Communication Tree:

Python3 — IR Decision Tree

Run it:

📸 Verified Output:

💡 Tip: The first 15 minutes of a ransomware incident are the most critical. Pre-authorise network isolation — do NOT wait for change-management approval to segment an infected host. Every minute of delay increases blast radius by an order of magnitude.


Step 8 (Capstone) — Full Architecture Report

This final step ties all 7 domains together into a single Enterprise Security Architecture JSON report with risk scores, compliance percentages, and a prioritised remediation roadmap — the deliverable a CISO presents to the board.

Python3 — Generate Full Architecture Report

Run it:

📸 Verified Output:

💡 Tip: An enterprise security score of 81.3/100 is respectable but not board-ready. The board wants trend lines, not point-in-time scores. Run this report monthly, store scores in a time-series database, and present the 12-month improvement trajectory — that's what demonstrates programme maturity.


🏆 Lab Summary

Step
Domain
Key Concept
Score

1

SOC Design

3-tier SOC, SIEM+SOAR, MTTD/MTTR metrics

82/100

2

Zero Trust

PEP/PDP/PA model, trust scoring, micro-segmentation

75/100

3

PKI

3-tier CA hierarchy, certificate chain validation

88/100

4

DevSecOps

5-stage security gate, SAST/DAST/SCA/IaC

79/100

5

Compliance

ISO 27001, SOC 2, NIST CSF 2.0, PCI DSS v4.0

82/100

6

Vuln Mgmt

CVSS v3.1 + EPSS priority queue, SLA tiers

78/100

7

Incident Response

Ransomware playbook, RACI, evidence collection

85/100

8

Architecture Report

Full JSON report, all domains, remediation roadmap

81.3 avg

Overall Enterprise Security Score: 81.3/100

Priority Remediation Actions:

  1. 🔴 Immediate — Patch 3 critical CVEs within 24-hour SLA

  2. 🟡 60 days — Expand Zero Trust micro-segmentation from 75% → 100% coverage

  3. 🟠 90 days — Close 63 PCI DSS v4.0 control gaps (currently 76.1% compliant)


🎓 Architect Track Complete

Congratulations — you have completed all 20 Cybersecurity Architect labs. You have designed, modelled, and validated:

  • ✅ SOC operations with SIEM/SOAR integration

  • ✅ Zero Trust architecture with policy engine

  • ✅ Enterprise PKI with 3-tier CA hierarchy

  • ✅ DevSecOps security gates across 5 scan stages

  • ✅ Multi-framework compliance gap analysis

  • ✅ Risk-prioritised vulnerability management

  • ✅ Automated incident response playbooks

  • ✅ Full enterprise security architecture report

Next step: Apply these frameworks to your organisation — run the gap analyser against your actual controls, feed real CVE data into the priority queue, and present the architecture report to your security leadership.


← Previous: Lab 19: Security Metrics & Risk Quantification | ↑ Back to: Architect README

Last updated