Image without description
  • Jacco Meijer
  • |
  • May 18, 2026

Reading the security architect three ways

CISSP, TOGAF, SABSA and what each one is for

Part of the series: Getting it organized properly. Notes from a field still finding its shape.

The role

The phrase security architect is widely used and rarely clear. Two practitioners using the term will often find they are describing materially different work. The term does not specify the work.

Role ambiguity is a familiar feature of architecture practice. Enterprise and solution architecture carry it too. Security architecture adds its own complication: it is a relatively young specialty in a field where the importance of security is still rising. The role is still settling, and different organizations describe it differently.

Read together from a CISSP vantage, three frameworks answer different questions about the role, and the security architect is best understood by reading all three.

Three frameworks

Each was chosen for what it represents rather than for completeness.

CISSP from ISC2 is the dominant senior security certification and the vantage this piece is written from.

TOGAF from the Open Group is the dominant enterprise architecture standard. Its treatment of security is worth examining because it sets the terms most architects work within.

SABSA from the SABSA Institute appears to be alone in being purpose-built for security architecture as a discipline.

CISSP itself points outward to SABSA. The Exam Outline lists SABSA as one of the security control frameworks a CISSP candidate is expected to know, and again under risk frameworks. The frameworks are not in opposition. CISSP names SABSA as part of what a senior security professional should understand.

Each takes a different approach to defining what an architect is and does. Reading them side by side shows where they agree, where they diverge, and which questions each one is best placed to answer.

The role view

The three frameworks take different stances on what a role even is.

CISSP does not name architect roles. It organizes bodies of knowledge that a senior security professional is expected to hold and leaves the question of who holds them to other sources. This is a scope choice. The certification is about knowledge, not org charts.

TOGAF names a full set of architect roles and the competencies each one holds. Security is treated as a quality of every architect's work rather than as the work of a single specialist.

SABSA names the security architect as a role and defines it through the artifacts that role produces. It also defines six views (Business, Architect, Designer, Builder, Tradesman and Facilities Manager) which describe perspectives on the work rather than separate roles.

Three frameworks, three answers to the same question. Trying to align them at the role level produces little more than confirmation that they were designed for different purposes. The more revealing comparison is at the level of skills, where all three describe the same underlying work in their own vocabularies.

The skill view

The required reading is skills. All three frameworks describe skills, though they structure them differently.

CISSP organizes its body of knowledge into eight domains and, beneath each, a set of task statements derived from ISC2's Job Task Analysis. These task statements are the closest thing CISSP has to a skill taxonomy. They describe what a CISSP-certified professional is expected to do, and they are published in the Exam Outline (see sources cited).

SABSA describes the work through a six-by-six matrix. Six layers (Contextual, Conceptual, Logical, Physical, Component, Operational) cross six columns (Assets/What, Motivation/Why, Process/How, People/Who, Location/Where, Time/When). Each cell names an artifact or concern. The matrix is the skill structure.

TOGAF takes a different route. Its seventy-one skill subcategories are scored against six architect roles using a four-level proficiency scale, where level 1 is Background and level 4 is Expert.

The table below uses the eight CISSP domains as a spine and shows what each framework names against that spine.

CISSP domainTOGAF skillsSABSA cells
Security and Risk ManagementRisk Management
Strategic Planning
Governance of Change
Visioning
Rules and Regulations
Motivation+Contextual
Motivation+Conceptual
Motivation+Logical
Asset SecuritySecurity and Asset Management
Data Security
Data Governance
Data Protection
Assets+Contextual
Assets+Logical
Assets+Physical
Security Architecture and EngineeringApplication Security
Principle Definition
Viewpoints and Views
Physical Security
Process+Conceptual
Process+Logical
Process+Physical
Process+Component
Communication and Network SecurityNetworks
Network Topology
Location Services
Security Services
Directory Services
Location+Logical
Location+Physical
Location+Component
Identity and Access ManagementLocation Services
Security Services
Directory Services
People+Logical
People+Physical
People+Component
People+Operational
Security Assessment and Testingnot namedProcess+Operational
Time+Operational
Security Operationsnot namedProcess+Operational
Assets+Operational
People+Operational
Location+Operational
Time+Operational
Software Development SecurityApplication Security
Application Development
Application Modeling
Process+Logical
Process+Physical
Process+Component

Reading this table by row shows that the three frameworks describe overlapping but not identical territory. Two CISSP domains have no TOGAF security skill named for them at all.

TOGAF treats assessment and operations as outside the architect's scope by design. A clearer view of the asymmetry comes from stepping back. Three buckets capture what the frameworks address.

🟒 Owns this | 🟠 Touches it | πŸ”΄ Out of scope

BucketCISSPTOGAFSABSA
Security domain knowledge🟒🟠🟠
Architect-general skillsπŸ”΄πŸŸ’πŸ”΄
Security architect work productπŸ”΄πŸŸ πŸŸ’

Each framework owns a bucket. Some touch the other or leave them out of scope. This is not a gap in any framework. It is a consequence of what each was built to do. CISSP certifies what a security professional must know. TOGAF describes how architects work together at the enterprise level. SABSA names what a security architect produces. The buckets reflect three different questions, and the answers do not compete.

A note on the CISSP vantage. ISC2 covers some of this ground separately through ISSAP, a CISSP concentration for security architecture with four domains of its own. ISC2 does have a position on security architecture as a specialism, just not within CISSP itself.

What this means

The role name does not carry the work. The skills do.

For a security architect working from a CISSP background, this changes how to reach for each framework.

CISSP gives the knowledge base. It defines what a security professional must know, with eight domains and task statements drawn from a Job Task Analysis. It is the cleanest spine when the question is what does a security architect need to know.

TOGAF gives the architect-general skills. These are the soft skills, the change skills, the modeling and decision-making skills any architect at any enterprise table needs to hold, regardless of specialism. TOGAF is where they are named and scored. It is the reference when the question is how does a security architect work alongside others.

SABSA gives the role itself. It names the security architect, defines the artifacts that role produces, and provides a matrix that ties motivation through to operation. It is the framework with an answer when the question is what does a security architect actually do.

The three frameworks are not competitors. They answer different questions, and the security architect role is best described by using all three. Reading from inside CISSP, the most useful thing to say about SABSA is that it picks up where CISSP leaves off.

Organizing this is harder than naming it. The work is collective and slow. The field gets organized by many people writing carefully about what they can see clearly. This article is one small contribution to that work.

Image without description
  • Jacco Meijer
  • |
  • May 15, 2026

Two Capabilities on the same back-plane

Security lives on the full back-plane of Enterprise Architecture and crosses the boundary of two perspectives of Capability

Sources cited

  • ISC2. The Official ISC2 CISSP CBK Reference, 6th Edition. 2021. Domain structure as updated in the CISSP Certification Exam Outline, effective 15 April 2024.
  • ISC2. ISSAP Certification Exam Outline.
  • The Open Group. TOGAF Standard, 10th Edition. Architecture Roles and Skills Series Guide. 2024.
  • The SABSA Institute. SABSA Certification Roadmap and SABSA White Paper (W101, 2009 revision).

Other posts

Image without description
  • Jacco Meijer
  • |
  • May 16, 2026

The human factor on the capability staircase

Can Amartya Sen's capability approach travel into Enterprise Architecture?

Image without description
  • Jacco Meijer
  • |
  • May 15, 2026

Two Capabilities on the same back-plane

Security lives on the full back-plane of Enterprise Architecture and crosses the boundary of two perspectives of Capability

Image without description
  • Jacco Meijer
  • |
  • Feb 2, 2026

Four architects and the limits of personality

Why legal, empirical and behavioural limits keep personality tools and role frameworks apart

Image without description
  • Jacco Meijer
  • |
  • Jan 5, 2026

Four architects and why we need all of them

What sounds like a casual observation is actually a structural truth: architecture isn’t about personalities, but about competing stances your organisation cannot afford to miss.

Image without description
  • Jacco Meijer
  • |
  • Oct 22, 2025

What cyber security mistakes do organizations still make?

A brief check on how the AI response for this question compares to real life experience.

Image without description
  • Jacco Meijer
  • |
  • Oct 19, 2025

Risk analysis for software development

By systematically identifying and assessing potential risks, teams can reduce uncertainty and prevent costly issues.

Image without description
  • Jacco Meijer
  • |
  • Oct 18, 2025

Security controls for software development

Exploring how security controls protect and improve every stage of the DevSecOps workflow.

Image without description
  • Jacco Meijer
  • |
  • Oct 17, 2025

Software development security

On risk assessments, security controls and the complexity of securing the Software Development Lifecycle (SDLC)

Image without description
  • Jacco Meijer
  • |
  • Oct 14, 2025

Canonical controls with Enterprise Risk and Security Management

How to use the SCF canonical control objectives with ERSM in Archimate

Image without description
  • Jacco Meijer
  • |
  • Oct 7, 2025

ISO 27000, ISA 62443, NIS2, BIO, NIST CSF and NIST SP 800-53

How to align the steadily increasing number of cyber security frameworks, standards and regulations?

Image without description
  • Jacco Meijer
  • |
  • Aug 15, 2025

Asset security

Information asset identification and classification from a security perspective

Image without description
  • Jacco Meijer
  • |
  • Aug 8, 2025

Data security

Data identification, data roles and data classification from a security perspective

Image without description
  • Jacco Meijer
  • |
  • Jul 25, 2025

Threat modeling, security frameworks and Enterprise Architecture

Combining ISO 27001, NIST CSF and threat modeling with Enterprise Architecture strengthens all elements

Image without description
  • Jacco Meijer
  • |
  • Jul 18, 2025

Threat modeling as part of a risk framework

Threat modeling in the context of ISO 27001 and NIST CSF

Image without description
  • Jacco Meijer
  • |
  • Jul 11, 2025

Cyber security risk frameworks

Managing cyber security risk with ISO 27001 and NIST CSF

Image without description
  • Jacco Meijer
  • |
  • Jun 27, 2025

NIST CSF Tiers for cyber security risk governance and management

NIST CSF 2.0 contains useful tiers for Capability Maturity Modeling in Enterprise Architecture

Image without description
  • Jacco Meijer
  • |
  • Jun 20, 2025

Archimate risk assessment elements

A few simple specializations for working with risk assessments in Archimate

Image without description
  • Jacco Meijer
  • |
  • Jun 13, 2025

Security principles in Enterprise Architecture

Adding security principles to Enterprise Architecture for NIST CSF and ISO 27001

Image without description
  • Jacco Meijer
  • |
  • Jun 6, 2025

Combining ISO 27001 and NIST CSF

How to use ISO 27001 and NIST Cyber Security Framework together

Image without description
  • Jacco Meijer
  • |
  • May 1, 2025

CISSP certification and Enterprise Architecture

How do the CISSP certification domains relate to Enterprise Architecture and the ArchiMate layers?

Image without description
  • Jacco Meijer
  • |
  • Apr 23, 2025

Architect roles in the ArchiMate context

An ArchiMate model that maps architect roles to the ArchiMate framework layers.

Image without description
  • Jacco Meijer
  • |
  • Mar 18, 2025

Visualizing IT Architecture in three languages, UML, C4 and ArchiMate

What are the differences and what are these languages most used for?

Image without description
  • Jacco Meijer
  • |
  • Feb 18, 2025

OAuth 2.0 and OpenID Connect Sequence Diagrams

Technical specs can be hard to read. While still highly technical, the UML Sequence Diagrams provided in this blog are a lot easier to understand.

Image without description
  • Jacco Meijer
  • |
  • Jan 9, 2025

OWASP and CISSP

OWASP recommendations from the independent information security certification CISSP.

Image without description
  • Jacco Meijer
  • |
  • Mar 21, 2024

UI Library with MDX documentation

Using the simple Render JSX plugin for Esbuild this post shows how to setup a simple UI library.

Image without description
  • Jacco Meijer
  • |
  • Mar 20, 2024

Render JSX plugin for Esbuild

Transform Esbuild generated JSX bundles to HTML pages.

Image without description
  • Jacco Meijer
  • |
  • Mar 19, 2024

Esbuild as a static site generator for MDX

Static site generators gain popularity. This blog is about using Esbuild as a static site generator for MDX.

Image without description
  • Jacco Meijer
  • |
  • Mar 18, 2024

11ty and Github pages

Simplifying the Contentful-Gatsby-Netlfy trio.

Image without description
  • Jacco Meijer
  • |
  • Jun 30, 2022

NPM7 and @npmcli/arborist

@npmcli/arborist is a powerful library that handles the new NPM 7 workspaces. This blog is about a simple make tool that uses the library.

Image without description
  • Jacco Meijer
  • |
  • May 12, 2022

Comparing React app, Nextjs and Gatsby

A new React project starts with a React toolchain. Main tools in the chains are SSR, React server components and GraphQL.

Image without description
  • Jacco Meijer
  • |
  • May 10, 2022

Versioning strategy for NPM modules

It is important to be able to bump the version of a NPM package without side effects.

Image without description
  • Jacco Meijer
  • |
  • Apr 12, 2022

React component themes and CSS variables

Creating React components with flexible themes by using CSS variables.

Image without description
  • Jacco Meijer
  • |
  • Mar 21, 2022

Content modeling with variants

The efficiency of a variant field in a content model.

Image without description
  • Jacco Meijer
  • |
  • Mar 12, 2022

Documentation

Documenting a software project is challenging. Here's a few simple guidelines that help a team writing clear documentation.

Image without description
  • Jacco Meijer
  • |
  • Mar 11, 2022

Javascript history

In 1986 David Ungar and Randall B. Smith developed Self at Xerox PARC. Inspired by Java, Scheme and Self Brendan Eich created Javascript in 1995.

Image without description
  • Jacco Meijer
  • |
  • Mar 10, 2022

On Javascript transpilers, bundlers and modules

There's Javascript transpilers, modules, bundles and bundlers. This is a brief overview of all of these.

Image without description
  • Jacco Meijer
  • |
  • Feb 11, 2022

Agile Scrum

The Agile Scrum framework is flexible enough to be used in many different ways. Here's one way of working.

Image without description
  • Jacco Meijer
  • |
  • Jan 20, 2022

What happened to Wheelroom?

Founded in 2018. Started to fly in 2020 and abandoned in 2021. What happened?

Image without description
  • Jacco Meijer
  • |
  • Jan 19, 2022

Contentful, Netlify and Gatsby four years later

What did we learn from using Contentful for four years?

Image without description
  • Jacco Meijer
  • |
  • Jan 18, 2022

Typescript interface for React UI components

How to define an interface for React UI components that prevents breaking changes.

Image without description
  • Jacco Meijer
  • |
  • Jan 17, 2022

Naming React components

What's in a name? A clear naming strategy helps developers communicate. Most devs rather spend time writing component code than wasting time on a good component name.