What is a Security Architecture Diagram?

Modified on Wed, 22 Jun, 2022 at 6:47 PM

Security architecture is often requested for risk or compliance management because it is a set of documentation that can provide the reviewer with an understanding of your technology and its security controls. 


The best way to document the security architecture is to go through each OSI Layer and explain (usually visually), your technology design. Specifically, how you implement the security for each layer.  




OSI Model and Security Architecture Diagram Requirements 

7 - Application Layer
  • what programming language, framework, and version are you using for your product>
  • what open-source packages and version
  • How do you handle patches?
  • what kind of database application do you use>
  • what resources is your platform using?
  • how is DR set up to recover the app?
6 - Presentation Layer
  • web, queue, notification, etc...services
  • protocols
  • API documentation
5 - Session Layer
  • ports, protocols, sessions
  • who can access, authenticated, and encrypted
4 - Transport Layer
  • transmission protocols
3 - Network Layer
  • Network WAN/LAN/VLAN
  • Network separations
  • IP addresses and hosts
2 - Data link layer
  • database settings
  • data encryption at rest
  • data validation checks
  • file share storage
  • DR redundancy
1 - Physical Layer
  • where is the physical infrastructure?
  • Is it with a single CSP or multi-cloud?
  • where is the physical recovery site?



If you need help developing your security architecture diagram, please contact us for consultation. 


Here are examples of some diagrams to view examples:

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article