- Random Access Memory
- Posts
- Communication Patterns
Communication Patterns
Communication patterns existing in infosec teams and how to improve them
From the Team Topologies concepts, it is important to deliver the maximum business outcome so that the business can be a differentiator in today’s market.
Conway's Law implies that the quality of a product or service is reflected in and linked to the working methods of the business that produces it. Hence, it is important to understand the security team’s communication patterns and team structure. Here, we will discuss communication patterns, examples of their application, and the importance of forming business-oriented teams.
The communication patterns observed in Team Topologies are:
Collaboration mode
X-as-a-Service mode
Facilitating mode
Below are examples of how each mode applies to different security tasks.
Collaboration Mode
Security reviews and feature sign-off
Secure code review
X-as-a-Service Mode
SAST
SCA, container image scan
CSPM (Does CSPM come under X-as-a-Service?)
Secret scans
Facilitating Mode
Security champions
Security training
Architecture reviews
There will be combinations of the above modes as we deliver value to customers or developers. For example, in a release, both Collaboration Mode and X-as-a-Service Mode work together. As we integrate more X-as-a-Service in VCS, the flow becomes faster.

Communication Patterns and Interaction
Collaboration Mode with developers
X-as-a-Service Mode with the platform/DevOps team to integrate security tools
Facilitating Mode with engineering, enabling them to choose better security options and educating them
1. Reduce Collaboration Mode
Use Collaboration Mode only when necessary. It is required for:
Features that lack documentation
Understanding new features and APIs
Clarifying doubts and terms
What is not necessary?
Unnecessarily pinging developers without reading the documentation
Joining their sprint planning, which increases workload just to understand what’s going on
Scheduling meetings without adequate preparation
Avoid over-collaboration—prioritize flow over perfectionism. Do not wait until everything is tested before moving forward. If something is causing delays:
Split tasks within the team
Prioritize important items and defer less critical ones
2. Increase X-as-a-Service Mode
As security engineers, we must work with DevOps/SRE/Platform teams to integrate security tools. Key integrations include:
SCA, SAST, container image scans
Secrets scanning
IaC scans in the VCS
Collaboration is necessary for initial reviews and integrations, but the goal is to automate as much as possible.
3. Increase Facilitating Mode
Security teams should act as facilitators or enablers for platform and engineering teams. This can be done by:
Reviewing team documents asynchronously
Encouraging the organization to think about security
Key Implementation Strategies:
Establishing Security Champions
Conducting Security Training
Forming a Business-Oriented Team Rather Than an Activity-Oriented Team
A business-oriented team prioritizes what is crucial for the company rather than just performing security activities. Businesses can be:
Companies with multiple product portfolios
Startups with a single product portfolio
If a product generates more revenue, securing it becomes a higher priority. However, security priorities also depend on:
The product itself
Customer expectations
Regulatory requirements
In B2B businesses, RFPs and compliance are crucial for business success. The GRC team should ensure that RFPs are completed on time without disrupting POC/POV processes. Skilled security engineers are required to implement and maintain compliance governance effectively.
In the feature security review process, prioritize flow over perfectionism.
InfraSec Considerations in Deployment
If deployment is maintained by the SRE team, then having an InfraSec team makes sense because deployment is platformized. The InfoSec team should work closely with the DevOps team.
If deployment is maintained by developers, and DevOps only provides the platform but does not manage operations:
DevOps in enabling mode provides tools and infrastructure for deployment and rollout
Developers create and manage service accounts and vaults
In such cases, the InfraSec team will be involved in the deployment phase to review security measures. However, as team handoffs increase, so does the time required.
Instead of involving infrasec engineers in review, security should operate in facilitator mode with the DevOps team to secure the provided platform. X-as-a-Service should be combined with Collaboration Mode to review developer-created IaC configurations.
Reply