Lab 20: Capstone — Enterprise Security Architecture
Time: 60 minutes | Level: Architect | Docker: docker run -it --rm zchencow/innozverse-cybersec:latest bash
🎯 Objective
Design and validate a complete Enterprise Security Architecture that integrates all 19 previous labs into a unified, measurable security program. You will build and run Python3 models for every major security domain — SOC, Zero Trust, PKI, DevSecOps, Compliance, Vulnerability Management, Incident Response — and generate a full JSON architecture report with risk scores and a remediation roadmap.
📚 Background
Enterprise security is not a collection of point solutions — it is an interconnected programme governed by risk appetite, compliance obligations, and continuous improvement metrics. A mature architecture ties together:
Operational layers — SOC, SIEM/SOAR, threat intelligence, incident response
Architectural controls — Zero Trust, PKI, micro-segmentation, IAM
Engineering controls — DevSecOps pipelines, container security, IaC scanning
Governance controls — compliance frameworks, vulnerability management SLAs, risk quantification
This capstone integrates concepts from every previous lab: SOC (Lab 01–02), TIP (Lab 03), Zero Trust (Lab 04), Cloud Security (Lab 05), IAM (Lab 06), PKI (Lab 07), SOAR (Lab 08), Container Security (Lab 09), DevSecOps (Lab 10), IR (Lab 11), Threat Hunting (Lab 12), Red Team (Lab 13), BCP/DR (Lab 14), Compliance (Lab 15), Vuln Mgmt (Lab 16), DLP (Lab 17), Network Security (Lab 18), and Risk Quantification (Lab 19).
Step 1 — SOC Design: 3-Tier Operations Centre
Architecture
A modern enterprise SOC operates across three analyst tiers plus a dedicated Threat Intelligence function:
SIEM + SOAR Integration:
Elastic SIEM ingests logs → Sigma rules fire alerts → SOAR orchestrates response
Automated playbooks handle: phishing triage, IOC enrichment, ticket creation, containment
Key Metrics Dashboard:
MTTD (Mean Time to Detect)
< 4 hours
> 8 hours = escalate
MTTR (Mean Time to Respond)
< 24 hours
> 72 hours = incident
False Positive Rate
< 20%
> 40% = tune rules
Analyst Utilisation
70–85%
> 90% = hire
Python3 — SOC Capacity Calculator
Run it:
📸 Verified Output:
💡 Tip: If your alert volume exceeds L1 capacity, analysts become bottlenecks and MTTD climbs. Auto-close low-fidelity alerts via SOAR to maintain headroom. Aim for 70% analyst utilisation — the 30% buffer handles alert spikes.
Step 2 — Zero Trust Network: PEP/PDP/PA Model
Architecture
Zero Trust (NIST SP 800-207) replaces perimeter trust with continuous, context-aware access decisions:
Micro-Segmentation Rules:
Finance zone: trust score ≥ 90, MFA required, managed device required
Engineering zone: trust score ≥ 70, MFA required
General zone: trust score ≥ 50
mTLS for service-to-service: All internal APIs use mutual TLS with SPIFFE/SPIRE-issued SVIDs (short-lived, no long-term secrets).
Identity-centric access (OIDC): Users authenticate via OIDC → JWT claims feed trust score calculation.
Python3 — Zero Trust Policy Engine
Run it:
📸 Verified Output:
💡 Tip: Never hardcode trust decisions based on IP address or network location alone. A Zero Trust score must include at minimum: identity assertion (authn), device posture, and context signal (location/time). Missing any one leg weakens the model.
Step 3 — PKI Infrastructure: 3-Tier CA Hierarchy
Architecture
Certificate Profiles:
TLS Server
Digital Sig, Key Enciph
90 days
ACME/certbot
Client Auth
Digital Sig
1 year
SCEP/EST
Code Signing
Digital Sig
3 years
Manual
SVID (mTLS)
Digital Sig
1 hour
SPIRE
ACME auto-renewal: Certificate lifetime ≤ 90 days; renew at 2/3 of lifetime using ACME (Let's Encrypt protocol). Monitor expiry with Prometheus ssl_expiry_seconds metric.
Python3 — Certificate Chain Validator
Run it:
📸 Verified Output:
💡 Tip: The offline Root CA should never touch a network. Store it on an HSM or encrypted USB. The only time you power it on is to sign the Intermediate CA certificate (a rare, ceremony-worthy event). OCSP stapling moves revocation checking to the server, eliminating privacy leaks from client-to-OCSP-responder traffic.
Step 4 — DevSecOps Pipeline: Security Gate
Pipeline Architecture
Stage thresholds:
SAST
bandit
Any critical finding
DAST
OWASP ZAP
> 2 high findings
SCA/SBOM
syft + grype
> 5 critical CVEs
Container Scan
trivy
> 3 critical CVEs
IaC Scan
checkov
> 10 failures
Python3 — Pipeline Stage Simulator
Run it:
📸 Verified Output:
💡 Tip: Fail SAST at zero critical findings — security bugs found in CI are 100× cheaper to fix than in production. Treat the security gate as a binary: all stages must pass. Use suppression files (
.trivyignore,bandit.yaml) sparingly and with mandatory review tickets.
Step 5 — Compliance Mapping: Multi-Framework Gap Analysis
Framework Coverage Matrix
Access Control
A.5.15–A.5.18
CC6.1–CC6.3
PR.AA
Req 7–8
Cryptography
A.8.24
CC6.7
PR.DS
Req 3–4
Incident Response
A.5.26
CC7.3–CC7.5
RS.MA
Req 12.10
Vulnerability Mgmt
A.8.8
CC7.1
ID.RA
Req 6
Logging & Monitoring
A.8.15–A.8.16
CC7.2
DE.CM
Req 10
Supply Chain
A.5.19–A.5.22
CC9.2
GV.SC
Req 12.8
Python3 — Compliance Gap Analyser
Run it:
📸 Verified Output:
💡 Tip: Map controls once, satisfy many. Most ISO 27001 controls overlap with NIST CSF and SOC 2 TSCs — a single control evidence artefact (e.g., a firewall change management procedure) can satisfy all three frameworks. Use a GRC platform (ServiceNow, Vanta, Drata) to link evidence to multiple frameworks automatically.
Step 6 — Vulnerability Management: CVSS + EPSS Priority Queue
Prioritisation Model
Traditional CVSS-only scoring leads to "patch treadmill" — hundreds of Critical findings, no time to prioritise. EPSS (Exploit Prediction Scoring System) provides the probability a CVE will be exploited in the wild within 30 days:
Exception workflow: Exceptions require CISO approval, business justification, compensating controls, and a review date (max 90-day extension).
Python3 — CVSS v3.1 Calculator + Priority Queue
Run it:
📸 Verified Output:
💡 Tip: A CVSS 9.8 with EPSS 0.01 is less urgent than a CVSS 7.5 with EPSS 0.85 — the latter is actively being exploited. EPSS scores update daily; integrate the EPSS API into your vulnerability scanner to get fresh probabilities automatically.
Step 7 — Incident Response: Ransomware Playbook
IR Framework (NIST SP 800-61 Rev 3)
RACI Matrix — Ransomware Incident:
Declare incident
R
A
I
I
I
Network isolation
R
A
C
I
I
Evidence collection
R
C
C
I
I
Executive comms
I
I
I
C
R/A
Ransom decision
I
I
I
C
R/A
Recovery approval
C
C
R
I
A
Communication Tree:
Python3 — IR Decision Tree
Run it:
📸 Verified Output:
💡 Tip: The first 15 minutes of a ransomware incident are the most critical. Pre-authorise network isolation — do NOT wait for change-management approval to segment an infected host. Every minute of delay increases blast radius by an order of magnitude.
Step 8 (Capstone) — Full Architecture Report
This final step ties all 7 domains together into a single Enterprise Security Architecture JSON report with risk scores, compliance percentages, and a prioritised remediation roadmap — the deliverable a CISO presents to the board.
Python3 — Generate Full Architecture Report
Run it:
📸 Verified Output:
💡 Tip: An enterprise security score of 81.3/100 is respectable but not board-ready. The board wants trend lines, not point-in-time scores. Run this report monthly, store scores in a time-series database, and present the 12-month improvement trajectory — that's what demonstrates programme maturity.
🏆 Lab Summary
1
SOC Design
3-tier SOC, SIEM+SOAR, MTTD/MTTR metrics
82/100
2
Zero Trust
PEP/PDP/PA model, trust scoring, micro-segmentation
75/100
3
PKI
3-tier CA hierarchy, certificate chain validation
88/100
4
DevSecOps
5-stage security gate, SAST/DAST/SCA/IaC
79/100
5
Compliance
ISO 27001, SOC 2, NIST CSF 2.0, PCI DSS v4.0
82/100
6
Vuln Mgmt
CVSS v3.1 + EPSS priority queue, SLA tiers
78/100
7
Incident Response
Ransomware playbook, RACI, evidence collection
85/100
8
Architecture Report
Full JSON report, all domains, remediation roadmap
81.3 avg
Overall Enterprise Security Score: 81.3/100
Priority Remediation Actions:
🔴 Immediate — Patch 3 critical CVEs within 24-hour SLA
🟡 60 days — Expand Zero Trust micro-segmentation from 75% → 100% coverage
🟠 90 days — Close 63 PCI DSS v4.0 control gaps (currently 76.1% compliant)
🎓 Architect Track Complete
Congratulations — you have completed all 20 Cybersecurity Architect labs. You have designed, modelled, and validated:
✅ SOC operations with SIEM/SOAR integration
✅ Zero Trust architecture with policy engine
✅ Enterprise PKI with 3-tier CA hierarchy
✅ DevSecOps security gates across 5 scan stages
✅ Multi-framework compliance gap analysis
✅ Risk-prioritised vulnerability management
✅ Automated incident response playbooks
✅ Full enterprise security architecture report
Next step: Apply these frameworks to your organisation — run the gap analyser against your actual controls, feed real CVE data into the priority queue, and present the architecture report to your security leadership.
← Previous: Lab 19: Security Metrics & Risk Quantification | ↑ Back to: Architect README
Last updated
