Security Assurance — URE Case
4/5 — Security as an Enabler (and “forward agency”)
Series: Security Assurance — URE Case — 4/5
Start from the beginning: 1/5 — The Inception
Next: 5/5 — Conclusion — Assurance Without Theater
Security enables the business when it shows up with agency: not just identifying risk, but carrying enough context to propose solutions that preserve the mission.
That requires a maturity shift.
When security arrives late, it often speaks in “non-English.” It blocks because the system is already committed to choices no one can defend.
In environments that run well, security shows up early with homework: business goals, constraints, performance expectations—and an opinionated set of safe defaults. The posture changes from “stop” to:
“Yes—and here are two ways to do it safely. Here’s the cost, the risk, and the path that keeps the launch on track.”
A concrete example: when “security” is availability (depending on the optics)
We were hired to assess a “security issue.” At first glance, it looked like availability. Depending on the optics, you could call it fragility.
The customer’s landing page shipped 6.5 MB of JavaScript. The development team insisted it was “impossible” to reduce. Over two decades, the system had accumulated the usual outcome of missing guardrails: undocumented patterns, uncommented commits, and dependency valleys no one wanted to enter.
When we dug in, the picture sharpened: the platform had a huge attack surface and was being hit by multiple DDoS campaigns, some of them sustained for days.
This wasn’t a theoretical risk. The business was under pressure: more than 80% of revenue depended on that platform, and we committed to keeping it up.
Constraints: the “obvious” solution wasn’t available
The solution wasn’t “add more products,” “add more layers,” or “scale horizontally.” We didn’t have that option—cost, timeline, and operational complexity made it unrealistic.
So we took a different posture: reduce exposure while preserving business value.
What we did (security as enablement)
We designed and delivered an SSR architecture for the entire front page and its dependencies.
The goal was simple:
- keep the browsing experience lightweight for every visitor,
- preserve the same organic/SEO value,
- and move the “non-touch wires” under the hood—out of reach from the public surface.
But the real security win wasn’t the rendering strategy by itself—it was reducing the exploitation attack surface. We deliberately protected critical endpoints from public access and tightened the boundary between anonymous browsing and sensitive backend capabilities.
That only worked because it was treated as a cross-functional, system design effort—not a last-minute patch. Engineering, frontend, boundary/edge teams, database, and architecture all aligned on the same intent: preserve the mission, and make the safe path the default.
Then we used intent as a boundary.
When the user’s journey reached the point where rich interaction was truly required—checkout—we transitioned them seamlessly to the full application experience (yes, the same “6.5 MB of JavaScript” version), but only at the moment it was needed.
The hidden operational cost: an extra TLS endpoint
One detail people often miss in “split the surface” designs: you can accidentally create an extra HTTPS endpoint (and sometimes an extra hostname) that has to be operated like production.
That isn’t free. It adds lifecycle and on-call burden:
- certificate issuance + renewal (and alarms for expiry)
- key custody and rotation assumptions
- TLS config drift (ciphers, HSTS, redirects, SNI, OCSP stapling, etc.)
- monitoring and incident playbooks for “cert broke at 02:00” or key compromise
Assurance means we count that cost up front: either avoid the extra endpoint, or automate it end-to-end with explicit ownership and observability—so “security as an enabler” doesn’t quietly become “security as an unowned ops tax.”
In practice, we reduced the anonymous attack surface by design by reshaping the surface:
- less client-side execution during anonymous browsing,
- less exposed complexity,
- less fragility under traffic anomalies,
- and a far cleaner perimeter to defend.
Outcome
The outcome wasn’t just “more secure.” It was more business.
- Load times dropped by ~90% on the first-load path
- Availability improved dramatically—we met the availability target for 24 months
- The company sustained 100%+ YoY growth, without rewriting the entire application, while stabilizing the surface under sustained attacks.
- The platform became defensible under real-world pressure, while keeping the business moving
Related reading
- If you want the broader framing: Improving Business Resiliency Through Security Assurance
- If you want the pillar index: Resilience Engineering
- If you want the domain hook: Reliability & Failure Engineering
And the delivery story matters: in two months, we shipped a production solution that had been projected to take more than 24 months. That acceleration wasn’t luck—it was the consequence of bringing security to the table, translating business intent into constraints, and giving the team options instead of vetoes.
This is what “security as an enabler” looks like: not blocking the business, not demanding a rewrite, and not hiding behind abstract controls—just reshaping the system so the mission survives reality.
In the next sections, I’ll show how to bring this posture into everyday work: how security stays active at the table, translates business requirements into constraints early, and arrives with options instead of vetoes.