<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>metaphors &amp;mdash; Nat Knight</title>
    <link>http://natknight.xyz/tag:metaphors</link>
    <description>Reflections, diversions, and opinions from a progressive ex-physicist programmer dad with a sore back.</description>
    <pubDate>Sun, 24 May 2026 16:26:21 -0700</pubDate>
    <item>
      <title>A Different Model for Security Teams</title>
      <link>http://natknight.xyz/a-different-model-for-security-teams</link>
      <description>&lt;![CDATA[#infosec #security #metaphors &#xA;&#xA;There is, in my experience, a certain mindset among some information security professionals. They see themselves as the keepers of arcane knowledge, duty bound to hold the cyber-line, the last thing standing between common application developers and complete pwnage. They&#39;re the few, the proud, the ones who can shut it all down in the name of security. I&#39;m not sure if it&#39;s a side effect of that field&#39;s association with the [&#34;intelligence community&#34;] or mere self importance; every profession has its foibles.&#xA;&#xA;Unfortunately, apart from the usual objections to cops and special forces, I think that the metaphor leads to some dysfunctional tendencies in structure and strategy.&#xA;&#xA;!--more--&#xA;&#xA;security review as a checkpoint on the way to deployment&#xA;preoccupation with active response instead of infrastructure&#xA;expertise siloed in the elite security team&#xA;strict adherence to policy over incremental progress&#xA;pursuing improvements by imposing requirements (&#34;laying down the law&#34;) instead of offering resources&#xA;&#xA;I&#39;d like to suggest a role model to replace the cyber-warrior: the [guard llama].&#xA;&#xA;figure&#xA;&lt;img &#xA;    src=&#34;https://live.staticflickr.com/4044/4413584362c4e20d2497h.jpg&#34;&#xA;    alt=&#34;A single llama in a pasture with a flock of sheep&#34;&#xA;/  figcaption&#xA;iThe Shepherd&#39;s Flock/i, Roger S. Hart, a href=&#34;https://www.flickr.com/photos/cathedrals/4413584362/&#34;Flickr/a, a href=&#34;https://creativecommons.org/licenses/by-nc/2.0/&#34;CC BY-NC/a&#xA;/figcaption&#xA;/figure&#xA;&#xA;A &#34;guard llama&#34; is a single llama (or similar beast) put out pasture with a flock of sheep to protect them from coyotes, wild dogs, etc.&#xA;&#xA;The guard llama:&#xA;&#xA;mingles with its flock&#xA;isn&#39;t so different from the animals it guards&#xA;is capable enough to deter threats without being paramilitary&#xA;does&#39;t take itself too seriously&#xA;&#xA;These are all qualities shared by the most effective and pleasant security teams I&#39;ve worked with.&#xA;&#xA;[&#34;intelligence community&#34;]: https://en.m.wikipedia.org/wiki/UnitedStatesIntelligenceCommunity&#xA;[guard llama]: https://en.m.wikipedia.org/wiki/Guardllama&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p><a href="http://natknight.xyz/tag:infosec" class="hashtag"><span>#</span><span class="p-category">infosec</span></a> <a href="http://natknight.xyz/tag:security" class="hashtag"><span>#</span><span class="p-category">security</span></a> <a href="http://natknight.xyz/tag:metaphors" class="hashtag"><span>#</span><span class="p-category">metaphors</span></a></p>

<p>There is, in my experience, a certain mindset among some information security professionals. They see themselves as the keepers of arcane knowledge, duty bound to hold the cyber-line, the last thing standing between common application developers and complete pwnage. They&#39;re the few, the proud, the ones who can shut it all down in the name of security. I&#39;m not sure if it&#39;s a side effect of that field&#39;s association with the <a href="https://en.m.wikipedia.org/wiki/United_States_Intelligence_Community">“intelligence community”</a> or mere self importance; every profession has its foibles.</p>

<p>Unfortunately, apart from the usual objections to cops and special forces, I think that the metaphor leads to some dysfunctional tendencies in structure and strategy.</p>


<ul><li>security review as a checkpoint on the way to deployment</li>
<li>preoccupation with active response instead of infrastructure</li>
<li>expertise siloed in the elite security team</li>
<li>strict adherence to policy over incremental progress</li>
<li>pursuing improvements by imposing requirements (“laying down the law”) instead of offering resources</li></ul>

<p>I&#39;d like to suggest a role model to replace the cyber-warrior: the <a href="https://en.m.wikipedia.org/wiki/Guard_llama">guard llama</a>.</p>

<figure>
<img src="https://live.staticflickr.com/4044/4413584362_c4e20d2497_h.jpg" alt="A single llama in a pasture with a flock of sheep"/>
<figcaption>
<i>The Shepherd&#39;s Flock</i>, Roger S. Hart, <a href="https://www.flickr.com/photos/cathedrals/4413584362/">Flickr</a>, <a href="https://creativecommons.org/licenses/by-nc/2.0/">CC BY-NC</a>
</figcaption>
</figure>

<p>A “guard llama” is a single llama (or similar beast) put out pasture with a flock of sheep to protect them from coyotes, wild dogs, etc.</p>

<p>The guard llama:</p>
<ul><li>mingles with its flock</li>
<li>isn&#39;t so different from the animals it guards</li>
<li>is capable enough to deter threats without being paramilitary</li>
<li>does&#39;t take itself too seriously</li></ul>

<p>These are all qualities shared by the most effective and pleasant security teams I&#39;ve worked with.</p>
]]></content:encoded>
      <guid>http://natknight.xyz/a-different-model-for-security-teams</guid>
      <pubDate>Sun, 19 Dec 2021 08:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>