Skip to content

Template — Security architecture review document

Preface: why use a template?

A template is a living document: it collects feedback over time and keeps security reviews consistent within a given security domain—such as application security, network security, or cloud security.

It carries a shared mindset for how to run the work: a common way of thinking, a dedicated process, and practices that can evolve as threats, stacks, and ownership change.

Treat this document as an initial base. Customize it for each domain and organization (scope, controls, evidence, and vocabulary) so the review matches how risk is actually owned and decided where you operate.

Use this as a checklist when preparing or recording a security architecture review: it ties business intent to technical design, explicit risks, and control coverage so reviewers and owners share the same picture.

Section 1 — Application background

  • Team (business owner, risk owner, tech lead, development)Names who can decide scope, accept residual risk, and answer technical questions so the review does not stall on ownership gaps.
  • Application business objectives and impactStates what success looks like and what breaks if the app fails, so security priorities align with real business harm, not generic threats.
  • Use casesDescribes how actors use the system end-to-end so threat modeling and controls map to actual flows instead of abstract components.
  • Supported use casesLists what is in production scope today so reviewers know where assurance must be strongest.
  • Out-of-scope use casesDocuments what is explicitly excluded so nobody assumes protection where none was designed or funded.
  • Technical requirements mapped to business requirementsShows how each major technical choice backs a business need, making trade-offs and gaps visible under scrutiny.
  • Design principlesCaptures non-negotiable engineering rules (e.g. least privilege, zero trust boundaries) so later design changes can be checked against intent.

Section 2 — Risk analysis (business objectives and ecosystem impact)

  • CIA analysisStates which of confidentiality, integrity, and availability matter most for this system and lists them in explicit priority order; that ranking drives trade-offs when controls collide and forms a baseline for severity adjustment so risk and incident handling stay aligned with what you protect first.

Section 3 — Architecture review

  • Architecture diagramGives a single visual of trust boundaries and data paths so reviewers can reason about blast radius and chokepoints consistently.
  • In-scope componentsEnumerates what this review covers (services, stores, integrations) so scope creep and orphan systems are avoided.
  • Assumptions (technical and business)Records beliefs the design relies on (latency, identity source, data residency) so wrong assumptions surface before they become incidents.
  • DependenciesOverview of what the application relies on externally so dependency failure or compromise is treated as first-class risk.
  • In-house solution dependenciesInternal platforms, shared libraries, and teams the app depends on for security-relevant behavior (auth, logging, deployment).
  • Cloud service dependenciesManaged services (IaaS/PaaS/SaaS) and their shared responsibility boundaries so control ownership is clear.
  • External dependencies (supply chain)Third-party software, APIs, and vendors whose compromise or change could affect your system’s integrity or availability.
  • Asset list and data classificationInventory of sensitive data and critical assets so protection and retention match sensitivity and regulatory expectations.
  • Control list mapped to CIALists controls and maps each to confidentiality, integrity, and/or availability so coverage gaps (e.g. strong integrity but weak availability) are obvious.

Section 4 — Security controls

  • CryptographyHow data is protected in transit and at rest (algorithms, protocols, TLS versions) so reviewers can judge strength and operational feasibility.
  • Key managementWhere keys live, who can use them, rotation, and break-glass so cryptographic controls remain trustworthy over the key lifecycle.
  • Database securityAccess model, encryption, backups, and segregation so datastore compromise is constrained and recoverable.
  • Log securityWhat is logged, who can read logs, integrity/tamper protection, and retention so detection and forensics are trustworthy and compliant.
  • Security configurationHardening baselines, feature flags, and secure-by-default settings so drift from a safe posture is visible and reversible.

Section 5 — Resources and references

  • Project wikiCanonical link to product/engineering docs so reviewers pull one current source of truth for scope and behavior.
  • Team wikiRunbooks, on-call, and team-specific conventions so operational reality matches what the architecture claims.
  • Document revision history, reviewer, and dateAudit trail of who approved which version and when so accountability and “what we knew then” are recoverable after changes.