Enterprise Security: Frameworks, Models, and Methodologies
The study of security is often hampered by a lack of rigorous theoretical foundations, leading to confusion between the concepts of "safety" and "security."
Security is not a static state but a dynamic equilibrium of opposing wills—a condition of "antagonism" rather than simple conflict.
This article synthesises a formal framework for operational security, defined as a function of the interaction between an Asset (A), a Protector (P), and a Threat (T) within a specific Situation (Si).
Key takeaways include:
The Conceptual Problem of Security
The primary hurdle in addressing security is determining if a problem is indeed one of "security." Problems of different natures require different premises, goals, and analytical methods.
Security vs. Safety
There is a long-standing cultural dispute between the physical sciences (often focusing on "safety") and the social sciences (focusing on "security").
The "Grey Area" of Indeterminacy
In theory, one might imagine "perfect security" (total freedom from danger) or "perfect non-security." In nature, neither exists.
The Formal Definition of Security
Operational security is expressed as a systemic function:
S = f(A, P, T) Si
Functional Dynamics
The Role of Situation (Si): Situation is not an actor but a characterising factor.
Even a minimal change in situational variables (time, psychological factors, and administrative laws) can represent the difference between protection and loss.
The Illusion of Safety: 5 Counter-Intuitive Truths About Modern Security
Most organisations approach security as a hardware acquisition phase—more cameras, thicker glass, or additional guards. We often rush into these expensive solutions without asking the essential question posed by Giovanni Manunta: "What kind of problem are we really in?" We must stop viewing security as a static destination and recognise it as a dynamic equilibrium of opposing human forces.
Security is Not Safety (And the Confusion is Costly)
We are currently suffering from a collective delusion that security can be managed through the same statistical models used for safety.
Safety generally addresses the "accidental product of chance," which can be mitigated through the physical sciences and predictable math.
Security is entirely different; it is a "product of antagonism" driven by thoughtful, motivated, and reactive human wills.
Because an antagonist is a "living risk" that learns from your conduct and adapts to your defences, traditional statistics and determinism are fundamentally useless. An antagonist is driven by choice and rationale, making them a creative force that traditional probability cannot account for. If your analysis relies on math rather than intelligence and strategy, you are preparing for a hazard, not a threat.
"Security, as risk, means ‘different things to different people and different things in different contexts’ (The Royal Society, 1992: 7)."
The Paradox of Implementation—When More Security Makes You Less Secure
The mere implementation of technology and procedures does not guarantee a higher state of security; in fact, it often generates "malign effects." Poorly defined measures can attract unwanted attention, infringe on civil rights, or even suggest internal treachery to observers. Without a functional definition of what security is actually for, these measures become a "rich pageantry of life" that serves no operational purpose.
When we lack a clear theoretical framework, we become unsure of the actual causes of what we are achieving. We spend millions on visible deterrents while remaining blind to whether those measures are meeting their goals or simply increasing the level of conflict. True security lies in the reasoning behind the action, not in the volume of equipment installed.
The Functional Identity Crisis—You are the Asset and the Protector
In the "A, P, T" model—Asset, Protector, and Threat—roles are functional rather than physically distinct. A single entity can inhabit multiple roles simultaneously, shifting depending entirely on the observer's perspective and the level of analysis. In personal security, for example, the individual is both the thing being protected and the entity responsible for the protection.
This fluidity is best seen in the example of the "military genius." A brilliant general is a vital Asset to the army and a Protector of the nation’s interests. However, from the state's perspective, that same general becomes a Threat if their genius and operational capabilities exceed political control.
Understanding security requires identifying the "originator of the process" to determine who is playing which role at any given moment.
Security is an "Infinite Game" of Obsolescence
Security is a forced and costly response to someone else’s initiative, making it an "infinite game" where every success is destined for obsolescence. As shown in the cycle of gap closure and continual monitoring, the moment a gap is closed, a reactive antagonist begins searching for a new vulnerability. There is a constant, shifting tension between your "Posture"—what you intend to do—and your "Actual" state of protection.
Interestingly, this infinite game is one of preservation rather than destruction. Unlike the military or finance sectors, where risk-taking is rewarded, security practitioners are fundamentally risk-averse. Because the goal is to preserve an existing state, flight is always preferred to fight. Avoidance and deterrence are the hallmarks of a successful strategy, separating security from more aggressive, risk-prone fields.
Recommended by LinkedIn
The Myth of the Objective Assessment
There is bitter evidence in this industry: a truly objective security assessment is an impossibility. Every analyst brings a heritage of training, unconscious beliefs, and self-interest that colour their vision and expectations. When an analyst presents "facts," they are actually presenting a perspective influenced by their own mental set and personal vision.
"Complexity of the concept defies easy reductionism, which makes things difficult for those who confound numbers with knowledge."
Because security data is dynamic and partially unknown, we cannot rely on the rigid facts of physics. Instead, we must strive for "justified true beliefs" that are robust enough to withstand the scrutiny of a funding board or a court of justice.
The reasoning behind every decision must be transparent and easy to inspect, as the argument's logic is the only thing that remains valid when the data shifts.
Conclusion: Beyond the Fences and Alarms
We must move away from the "shopping list" approach of guards and CCTV and toward a systemic, theoretical framework. Security is a daily struggle for life, a rational response to the basic human instinct for survival and tranquillity.
It is an open system that simultaneously interferes with the individual, the organisation, and the state.
If security is a dynamic equilibrium of opposing wills rather than a collection of barriers, are you focusing your resources on the right antagonists? Or are you merely participating in the expensive pageantry of protection while your vulnerabilities evolve in the shadows?
The Logic of Antagonism and Intentionality
Security is a "product of antagonism"—a conflict between at least two human wills where one seeks protection and the other causes worry.
The Three Stages of Security Action
A security process is fully intentional and follows three stages:
Security as Risk-Aversion
Unlike "risk-prone" fields (financial or military), security is inherently risk-averse.
Justification: Security measures are not "defend to the last" but "defend as long as justified" based on self-utility.
Analytical Methodology
Effective security moves away from "automatic" prescriptions (fences, CCTV) toward a systemic methodology.
The Four Stages of Analysis
The "Infinite Game" of Monitoring
As illustrated in contemporary systems thinking, security is a cycle of Continual Monitoring.
Gap Management: The difference between actual and desired states is the "Gap," which must be closed through managed influence and threat mitigation.
Epistemic Challenges and Constraints
Security analysis is never fully objective; it is a human-made process subject to significant biases.
The Role of the Analyst
Justified True Belief
Because the security context is dynamic—threats, technologies, and tactics change—a "permanent" solution is impossible. The goal is to reach a "justified true belief" that the problem is currently addressed. This belief must be:
Practical Implementation
To be effective, security must be situated in its particular circumstances.
Decision Criteria: Final decisions on performance standards are usually "political," involving negotiations and compromises between different stakeholders within an organisation. The credibility and charisma of the security-responsible are often decisive in these negotiations.
Conclusion
The epistemic requirement for professional security is the attainment of a "Justified True Belief." Because security contexts are unstable and decisions are influenced by human bias (beliefs, expectations, self-interest), every step of the reasoning must be clear and easy to inspect. This rigour is not optional; it is the only basis for attributing responsibility, blame, and liability in judicial or corporate contexts. While the game is infinite and the conditions are dynamic, the methodology provides the only justifiable foundation for action.
References:
Manaunta, G. & Manunta R. (2026). Theorising About Security, in Gill. M. (ed), The Handbook of Security, 1st ed, Palgrave Macmillan, pp.629-657
Ridley, T. (2025). Security Risk Management-in-Depth, Available at: https://buff.ly/vBSVPgv
Willet, K. (2022). Systems Thinking in Security, in Masys, A. (ed). Handbook of Security Sciences, Springer, pp.553-572.
Great information 👏