Image without description
  • Jacco Meijer
  • |
  • Oct 14, 2025

Canonical controls with Enterprise Risk and Security Management

How to use the SCF canonical control objectives with ERSM in Archimate

Secure Controls Framework

The post below on how to align the steadily increasing number of security standards refers to the Secure Controls Framework (SCF) as an example. This post is about how to use the SCF canonical control objectives with Enterprise Risk and Security Management (ERSM) in Archimate.

Image without description
  • Jacco Meijer
  • |
  • Oct 7, 2025

ISO 27000, ISA 62443, NIS2, BIO, NIST CSF and NIST SP 800-53

How to align the steadily increasing number of cyber security frameworks, standards and regulations?

Setup SCF

Using the SCF can save a lot of time because it brings ready to use STRM relationship documentation and it improves in terms of efficiency, but SCF is not a commercial off the shelf solution. Because frequent misunderstanding, SCF provides what the SCF is not in the official documentation. In summary:

NOT A substitute for performing due diligence and due care, NOT A complete technology or documentation solution to address all your cybersecurity & data privacy needs and NOT A solution guaranteed to meet every compliance requirement of your organization

SCF has extensive documentation on setting up a Cybersecurity & Data Privacy Risk Management Model. Before assessing the likelihood and impact of risk in detail it requires in depth risk analysis first. This includes setting up risk, threat and controls catalogs.

SCF Meta model

Figure 3 in this post on security standards models all elements of the SCF.

Figure 1 shows an updated version of the same model with some changes:

  • all technology elements are moved together;
  • the threat catalog is linked to the SCF control;
  • the loss element, representing the likelihood that the risk occurs is moved outside of the SCF
Image without description
Figure 1. SCF with cyber security risk and standards. Square brackets define the source.

Modeling risk and security

In risk analysis, a risk is typically evaluated by assessing two factors: likelihood and impact.

Likelihood refers to the probability that a risk event will occur, while impact represents the potential consequences or losses if the risk materializes.

Adding threats and vulnerability to assets modeled in Enterprise Architecture is a good way to understand risk. Especially for complex risk, visualizing the relationships helps assessing risk.

When inherent risk is evaluated and likelihood or impact can be reduced with cost effective measures the canonical controls come into play. The table below shows other possible risk evaluation outcomes.

EvaluationTreatmentExample Action
Risk exceeds acceptable thresholdAvoidDiscontinue the activity, technology or process entirely
Risk can be reduced cost-effectivelyMitigateImplement technical or procedural controls
Mitigation is not cost-effectiveTransferOutsource, use insurance or shift risk to cloud service
Mitigation and transfer are not cost-effective or feasibleAcceptDocument the risk, monitor it and proceed with awareness

Archimate modeling with SCF

Modeling archimate with SCF requires the SCF components to be available as archimate elements. Figure 1 shows that these components are:

  • the threat catalog;
  • the risk catalog;
  • the principle sets;
  • the SCF control objectives.

When the catalog solution and the archimate model solution are not the same, interfacing is needed to make the catalog available to the model solution.

For example, the Bizzdesign model solution is able to interface with the IT management platform ServiceNow. Another example on the Bizzdesign platform is setting up an Excel connector.

Example model

Figure 2 shows an archimate model of a simple web application that uses SCF to model risk.

This view leaves out the principle sets as well as many of the SCF internal relationships as modeled in figure 1. The view focuses on these elements:

  • Loss: connects threat and risk, the loss event represents the probability that the threat event exploits the vulnerability;
  • Vulnerability: connects the elements that contain the weakness with the threat and relates the threat to the SCF objective.
  • Measure: is realized by the technology elements that secure the vulnerability.
Image without description
Figure 2. SCF threat modeling example with a firewall that contains a vulnerability

Cyber security standards

Figure 1 shows control measures from standard y and control objectives from standard x. This is to illustrate that some security standards contain mainly objectives, like ISO 27001 and NIST CSF 2.0. Whereas other standards contain merely measures. ISO 27002 and NIST SP 800 53 are good examples of the latter.

The example in figure 2 uses a control measure. The measure is realized by the mTLS solution. Depending on the use case, the choice is to either use the measure from the standard or to leave the measure out and have the mTLS solution realize the SCF control objective directly.

Same choice for the influence relationship that decreases the vulnerability. This can be modeled from the control objective, the control measure or both.

For risk assessment both choices make little difference. Depending on an audit for a specific standard you might need to model accordingly. Think of the evaluation of which measures from a standard have a realized-by relationship.

Traffic lights and heat maps

Some Enterprise Architecture solutions have integrated risk properties like vulnerability level and threat capability for qualitative risk analysis. These property values are often displayed as traffic lights next to the Archimate elements.

Evaluating risk with properties allows for e.g. security heat map representations.

Conclusion

This short post is mainly about the two example models. Figure 1 can be used as a SCF meta model and figure 2 shows how to add risk assessment and risk treatment.

The models in this post are kept simple and risk management for these models is mainly overkill. For organizations that use the holistic security approach however, models like these add great value.


Other posts

Image without description
  • Jacco Meijer
  • |
  • Oct 22, 2025

What cyber security mistakes do organizations still make?

A brief check on how the AI response for this question compares to real life experience.

Image without description
  • Jacco Meijer
  • |
  • Oct 19, 2025

Risk analysis for software development

By systematically identifying and assessing potential risks, teams can reduce uncertainty and prevent costly issues.

Image without description
  • Jacco Meijer
  • |
  • Oct 18, 2025

Security controls for software development

Exploring how security controls protect and improve every stage of the DevSecOps workflow.

Image without description
  • Jacco Meijer
  • |
  • Oct 17, 2025

Software development security

On risk assessments, security controls and the complexity of securing the Software Development Lifecycle (SDLC)

Image without description
  • Jacco Meijer
  • |
  • Oct 7, 2025

ISO 27000, ISA 62443, NIS2, BIO, NIST CSF and NIST SP 800-53

How to align the steadily increasing number of cyber security frameworks, standards and regulations?

Image without description
  • Jacco Meijer
  • |
  • Aug 15, 2025

Asset security

Information asset identification and classification from a security perspective

Image without description
  • Jacco Meijer
  • |
  • Aug 8, 2025

Data security

Data identification, data roles and data classification from a security perspective

Image without description
  • Jacco Meijer
  • |
  • Jul 25, 2025

Threat modeling, security frameworks and Enterprise Architecture

Combining ISO 27001, NIST CSF and threat modeling with Enterprise Architecture strengthens all elements

Image without description
  • Jacco Meijer
  • |
  • Jul 18, 2025

Threat modeling as part of a risk framework

Threat modeling in the context of ISO 27001 and NIST CSF

Image without description
  • Jacco Meijer
  • |
  • Jul 11, 2025

Cyber security risk frameworks

Managing cyber security risk with ISO 27001 and NIST CSF

Image without description
  • Jacco Meijer
  • |
  • Jun 27, 2025

NIST CSF Tiers for cyber security risk governance and management

NIST CSF 2.0 contains useful tiers for Capability Maturity Modeling in Enterprise Architecture

Image without description
  • Jacco Meijer
  • |
  • Jun 20, 2025

Archimate risk assessment elements

A few simple specializations for working with risk assessments in Archimate

Image without description
  • Jacco Meijer
  • |
  • Jun 13, 2025

Security principles in Enterprise Architecture

Adding security principles to Enterprise Architecture for NIST CSF and ISO 27001

Image without description
  • Jacco Meijer
  • |
  • Jun 6, 2025

Combining ISO 27001 and NIST CSF

How to use ISO 27001 and NIST Cyber Security Framework together

Image without description
  • Jacco Meijer
  • |
  • May 1, 2025

CISSP certification and Enterprise Architecture

How do the CISSP certification domains relate to Enterprise Architecture and the ArchiMate layers?

Image without description
  • Jacco Meijer
  • |
  • Apr 23, 2025

Architect roles in the ArchiMate context

An ArchiMate model that maps architect roles to the ArchiMate framework layers.

Image without description
  • Jacco Meijer
  • |
  • Mar 18, 2025

Visualizing IT Architecture in three languages, UML, C4 and ArchiMate

What are the differences and what are these languages most used for?

Image without description
  • Jacco Meijer
  • |
  • Feb 18, 2025

OAuth 2.0 and OpenID Connect Sequence Diagrams

Technical specs can be hard to read. While still highly technical, the UML Sequence Diagrams provided in this blog are a lot easier to understand.

Image without description
  • Jacco Meijer
  • |
  • Jan 9, 2025

OWASP and CISSP

OWASP recommendations from the independent information security certification CISSP.

Image without description
  • Jacco Meijer
  • |
  • Mar 21, 2024

UI Library with MDX documentation

Using the simple Render JSX plugin for Esbuild this post shows how to setup a simple UI library.

Image without description
  • Jacco Meijer
  • |
  • Mar 20, 2024

Render JSX plugin for Esbuild

Transform Esbuild generated JSX bundles to HTML pages.

Image without description
  • Jacco Meijer
  • |
  • Mar 19, 2024

Esbuild as a static site generator for MDX

Static site generators gain popularity. This blog is about using Esbuild as a static site generator for MDX.

Image without description
  • Jacco Meijer
  • |
  • Mar 18, 2024

11ty and Github pages

Simplifying the Contentful-Gatsby-Netlfy trio.

Image without description
  • Jacco Meijer
  • |
  • Jun 30, 2022

NPM7 and @npmcli/arborist

@npmcli/arborist is a powerful library that handles the new NPM 7 workspaces. This blog is about a simple make tool that uses the library.

Image without description
  • Jacco Meijer
  • |
  • May 12, 2022

Comparing React app, Nextjs and Gatsby

A new React project starts with a React toolchain. Main tools in the chains are SSR, React server components and GraphQL.

Image without description
  • Jacco Meijer
  • |
  • May 10, 2022

Versioning strategy for NPM modules

It is important to be able to bump the version of a NPM package without side effects.

Image without description
  • Jacco Meijer
  • |
  • Apr 12, 2022

React component themes and CSS variables

Creating React components with flexible themes by using CSS variables.

Image without description
  • Jacco Meijer
  • |
  • Mar 21, 2022

Content modeling with variants

The efficiency of a variant field in a content model.

Image without description
  • Jacco Meijer
  • |
  • Mar 12, 2022

Documentation

Documenting a software project is challenging. Here's a few simple guidelines that help a team writing clear documentation.

Image without description
  • Jacco Meijer
  • |
  • Mar 11, 2022

Javascript history

In 1986 David Ungar and Randall B. Smith developed Self at Xerox PARC. Inspired by Java, Scheme and Self Brendan Eich created Javascript in 1995.

Image without description
  • Jacco Meijer
  • |
  • Mar 10, 2022

On Javascript transpilers, bundlers and modules

There's Javascript transpilers, modules, bundles and bundlers. This is a brief overview of all of these.

Image without description
  • Jacco Meijer
  • |
  • Feb 11, 2022

Agile Scrum

The Agile Scrum framework is flexible enough to be used in many different ways. Here's one way of working.

Image without description
  • Jacco Meijer
  • |
  • Jan 20, 2022

What happened to Wheelroom?

Founded in 2018. Started to fly in 2020 and abandoned in 2021. What happened?

Image without description
  • Jacco Meijer
  • |
  • Jan 19, 2022

Contentful, Netlify and Gatsby four years later

What did we learn from using Contentful for four years?

Image without description
  • Jacco Meijer
  • |
  • Jan 18, 2022

Typescript interface for React UI components

How to define an interface for React UI components that prevents breaking changes.

Image without description
  • Jacco Meijer
  • |
  • Jan 17, 2022

Naming React components

What's in a name? A clear naming strategy helps developers communicate. Most devs rather spend time writing component code than wasting time on a good component name.