Skip to content

Instantly share code, notes, and snippets.

@jonathanhle
Created July 14, 2025 22:56
Show Gist options
  • Save jonathanhle/a94718771d3ab46c9f745cba729040ae to your computer and use it in GitHub Desktop.
Save jonathanhle/a94718771d3ab46c9f745cba729040ae to your computer and use it in GitHub Desktop.
Security Organization Structure (Reference Model)

Security Organization Structure (Reference Model)

This document outlines a structured and scalable security organization suitable for a high-growth, cloud-native technology company with significant infrastructure, regulatory obligations, and user-facing product surface area.

The organization is designed for ~1,000 employees and ~150–200 engineers, and it aims to cover the entire security lifecycle: from build-time controls to runtime detection, incident response, compliance, and onchain or product-specific risk.


🌲 Security Org Tree with Inline Role Scopes

πŸ“Ž Notation

Each role in the org tree is followed by a (num) indicating recommended headcount for that function.

CSO/
β”œβ”€β”€ Deputy-CSO-or-CISO                   (1)  β€” Strategic leadership; separates governance from execution
β”œβ”€β”€ Security-Engineering                 (30) β€” Builds and defends core systems: AppSec, Infra, IAM, Crypto
β”‚   β”œβ”€β”€ Application-Security             (7)  β€” Secures code, libraries, pipelines, and partner teams
β”‚   β”‚   β”œβ”€β”€ AppSec-Engineers             (3)  β€” SAST, secure reviews, bug triage, developer enablement
β”‚   β”‚   β”œβ”€β”€ Threat-Modeling              (1)  β€” Architecture analysis and attack surface definition
β”‚   β”‚   β”œβ”€β”€ Partner-Security             (1)  β€” Embedded security with product teams
β”‚   β”‚   └── CI-CD-Security               (2)  β€” Protects the build pipeline, secret scanning, signing
β”‚   β”‚       β”œβ”€β”€ Pipeline-Hardening       (1)  β€” Controls for Jenkins/GitHub/GitLab workflows
β”‚   β”‚       └── Build-Signing-Tooling    (1)  β€” SLSA/Cosign, enforce artifact integrity
β”‚   β”œβ”€β”€ Infrastructure-Security          (10) β€” Hardens infra runtime: cloud, containers, K8s, network
β”‚   β”‚   β”œβ”€β”€ Cloud-Security               (2)  β€” IAM boundaries, SCPs, IaC policies
β”‚   β”‚   β”œβ”€β”€ Host-Hardening               (1)  β€” Hardened AMIs, OS security, EDR config
β”‚   β”‚   β”œβ”€β”€ Network-Architecture         (1)  β€” Segmentation, egress policies, bastion/ingress rules
β”‚   β”‚   β”œβ”€β”€ PKI-Engineering              (2)  β€” Internal CA, mTLS, cert rotation, SPIFFE/SPIRE
β”‚   β”‚   β”‚   β”œβ”€β”€ Internal-CA              (1)  β€” Vault/StepCA management
β”‚   β”‚   β”‚   └── Cert-Lifecycle-Automation(1)  β€” Rotate, revoke, alert
β”‚   β”‚   β”œβ”€β”€ Container-Security           (2)  β€” Image scanning and runtime protection
β”‚   β”‚   β”‚   β”œβ”€β”€ Image-Scanning           (1)  β€” Build-time SBOM/Vuln checks
β”‚   β”‚   β”‚   └── Runtime-Enforcement      (1)  β€” Admission controls, runtime constraints
β”‚   β”‚   └── Kubernetes-Security          (2)  β€” Cluster policy, RBAC, and control plane protection
β”‚   β”‚       β”œβ”€β”€ Admission-Control-Policy(1)  β€” OPA, Kyverno, baseline guardrails
β”‚   β”‚       └── K8s-RBAC-Hardening       (1)  β€” Audit roles, limit escalation
β”‚   β”œβ”€β”€ IAM                              (4)  β€” SSO, JIT, Secrets, Identity lifecycle across internal systems
β”‚   β”‚   β”œβ”€β”€ Directory-Integration        (1)  β€” Okta/GWS/AAD SCIM connectors
β”‚   β”‚   β”œβ”€β”€ RBAC/JIT-Access              (1)  β€” Role enforcement, TTL-based elevation
β”‚   β”‚   └── Secrets-Management           (2)  β€” Vault, AWS KMS, secure workflows
β”‚   └── Cryptography                     (4)  β€” Custody keys, MPC infra, HSMs, threshold signing
β”‚       β”œβ”€β”€ MPC-Platform                 (2)  β€” Key orchestration and custody workflows
β”‚       └── Key-Lifecycle/HSMs          (2)  β€” Signing infra, key splits, storage logic
β”œβ”€β”€ Security-Operations                  (16) β€” Detect, respond, and automate against real threats
β”‚   β”œβ”€β”€ Threat-Detection-and-Response    (7)  β€” Detection logic, SOAR, threat intel
β”‚   β”‚   β”œβ”€β”€ Detection-Engineering        (3)  β€” SIEM pipelines, detections-as-code
β”‚   β”‚   β”œβ”€β”€ Threat-Intel                 (2)  β€” Actor mapping, TTPs, intel feeds
β”‚   β”‚   └── SOAR-Automation              (2)  β€” Triage orchestration, auto-response playbooks
β”‚   β”œβ”€β”€ Incident-Response                (5)  β€” On-call, IR plans, forensics, containment
β”‚   β”‚   β”œβ”€β”€ On-Call-IR                   (2)  β€” Triage, escalation, coordination
β”‚   β”‚   β”œβ”€β”€ Forensics/RCA                (2)  β€” Artifact handling, root cause
β”‚   β”‚   └── Tabletop-Exercises           (1)  β€” IR maturity, team drills
β”‚   └── Insider-Threat                   (4)  β€” DLP, high-risk access, behavioral monitoring
β”‚       β”œβ”€β”€ DLP-Monitoring               (2)  β€” GWS/DLP, SaaS monitoring
β”‚       └── Privileged-Access-Analytics (2)  β€” Detection for abuse of access
β”œβ”€β”€ GRC-and-Compliance                   (6)  β€” Controls, policy, audit, vendor risk
β”‚   β”œβ”€β”€ Audit-Readiness                  (2)  β€” SOC2, ISO27001, SOX testing
β”‚   β”œβ”€β”€ Risk/Control-Mapping             (2)  β€” NIST, CIS, CSA CCM frameworks
β”‚   β”œβ”€β”€ Vendor-Risk                      (1)  β€” Third-party assessments and onboarding checks
β”‚   └── Policy-and-Awareness            (1)  β€” Internal policy docs and security training
β”œβ”€β”€ Trust-and-Safety                     (5)  β€” User trust, abuse prevention, fraud response
β”‚   β”œβ”€β”€ ATO-Detection/Mitigation         (2)  β€” Detect account takeovers, enforce MFA challenges
β”‚   β”œβ”€β”€ Abuse-Detection                  (1)  β€” Scraping, spam, and API abuse
β”‚   └── Customer-Escalation-Support      (2)  β€” Handles inbound security tickets w/ CX
β”œβ”€β”€ Blockchain-Security                  (4)  β€” Smart contract risk, onchain analytics, bridge security
β”‚   β”œβ”€β”€ Smart-Contract-Review            (2)  β€” Manual audits, fuzzing, static analysis
β”‚   β”œβ”€β”€ Protocol/Bridge-Analysis         (1)  β€” Risk scoring of L1/L2 chains and bridges
β”‚   └── Onchain-Threat-Detection         (1)  β€” Real-time detection of illicit activity
└── Security-Partners                    (3)  β€” Embedded security engineers within core teams
    β”œβ”€β”€ Embedded-Infra-Squad             (1)  β€” Works with platform, DevOps, cloud teams
    β”œβ”€β”€ Embedded-Product-Squad           (1)  β€” Partners with feature teams on secure design
    └── Launch-Threat-Assessment         (1)  β€” Reviews high-risk launches and changes

πŸ“Š Security Headcount vs Company Size (Recommended)

Company Size Engineers Recommended Security HC % of Eng
~1,000 employees 150–200 60–70 30–40%
~500 employees 75–100 30–40 35–40%
~250 employees 35–50 15–25 40–50%

πŸ“ˆ How to Use

  • Phase hiring: prioritize InfraSec, AppSec, TDR, IAM, GRC β†’ then scale out crypto/onchain/security partners
  • Use the tree to define ownership boundaries, accountability, team charters, and hiring plans
  • Adapt to org size: each sub-tree is independently scalable by company maturity
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment