conference logo

Playlist "What Hackers Yearn 2025"

Using deployment diagrams to explain architecture and security to everybody

Peter van Eijk

This talk will enable you to lead architecture conversations and discuss their security options through an informal diagramming technique. I will use examples such as key/encryption architectures, DevOps, and even your home music system.

Presentation at https://digitalinfrastructures.nl/why2025/

You have seen many diagrams of computer and information systems in your career. They have been around since the early days of computing. They can be useful, but there are a few typical problems with them:
• They are drawn with obscure symbols that are only understood by architects
• They are drawn in an inconsistent way
• They are not used to their fullest potential.
In my practice I have run into these problems often, and I have found ways to turn a certain type of diagram, a simplified version of deployment diagrams, into the cornerstone of explanation of what goes on in cloud and cybersecurity.
In the talk I will lead you through the basic principles, and a few examples. This will enable you to lead architecture conversations and discuss their security options. I will use examples such as key/encryption architectures, DevOps, and even your home music system.

Licensed to the public under https://creativecommons.org/licenses/by/4.0/