A Research Perspective on Modern Cybersecurity Architecture
April 2, 2025
Research Fellow:
- Bobby Boughton, Macro Praxis Research Institute Fellow
Link To Research Paper Executive Summary
Research Paper Exhibits:
Exhibit A: Cybersecurity Best Practice Architecture
Exhibit B: What Could Go Wrong
Exhibits - Explained
- The Left Side reflects industry-standard prevention strategies based on NIST, ISO, and Zero Trust principles. These controls are designed to stop attackers across an almost infinite and ever-changing attack surface — but they require near-perfect implementation to succeed, and even then, gaps remain due to misconfigurations, human error, and emerging threats.
- The Middle Section highlights the consequences when prevention fails — and a breach occurs. At this stage, attackers can move laterally within 62 minutes, and often dwell in systems undetected for 11 to 200 days. During this window, the risk of data theft, ransomware deployment, and operational disruption rises sharply. According to IBM, the average cost of a data breach is $4.88 million globally, and $9.36 million in the U.S., underscoring the urgency of early detection and containment.
- The Right Side prepares for this inevitable moment of failure by using deception technology to surround the finite objectives attackers seek — credentials, privileged access, and sensitive data. By embedding decoys and lures at these key points, deception acts as a backstop to traditional defenses, providing early, high-fidelity alerts that can expose intruders before damage is done — and in some cases, reduce the breach cost to zero.
Abstract:
In today’s volatile threat landscape, the traditional goal of preventing every cyber intrusion has become increasingly untenable. Breaches persist — not because security teams are negligent, but because the attack surface has outpaced the reach of even the most sophisticated controls. This paper explores a growing shift in cybersecurity strategy — led by forward-thinking CISOs — toward an assume breach mindset that emphasizes early detection, operational resilience, and realistic boardroom narratives.
This shift marks a fundamental reframing of the CISO’s role: away from chasing perfection and toward building security programs that expect failure and are architected to recover quickly from it. At the heart of this evolution is deception technology — a preemptive and politically astute tool that acts as a backstop to existing defenses. By placing interactive decoys and high-fidelity lures across IT, OT, and cloud environments, deception solutions detect attacker movement early in the intrusion cycle — often before material damage occurs.
The financial stakes of late detection are rising sharply. According to IBM’s 2024 Cost of a Data Breach Report, the global average cost of a breach is now $4.88 million, rising to $9.36 million in the United States. While these figures reflect the cost of breaches that go undetected for days or weeks, many breaches could incur little to no cost if detected and contained early — before attackers reach their objectives such as data theft or ransomware deployment. Deception technology is uniquely positioned to enable this outcome by surfacing attacker behavior at the moment traditional defenses fail.
Drawing on guidance from leading analysts and public agencies, this paper illustrates how deception enables proactive breach response, reduces attacker dwell time, and strengthens the CISO’s narrative with executive stakeholders. We conclude with a new framework for integrating deception into enterprise security operating models — supporting not only better security outcomes, but also more credible, cost-conscious leadership in the boardroom.
1. Introduction: The Case for Assume Breach
The cybersecurity landscape has undergone a radical transformation. As enterprises extend their operations into cloud, IoT, and operational technology (OT) environments, the traditional boundaries of security architectures have eroded. Attack surfaces are now dynamic and diffuse, leaving defenders in a continuous race against increasingly sophisticated adversaries. In this context, conventional perimeter-based defense strategies, while necessary, are proving insufficient. Despite best-in-class controls — including endpoint detection, identity and access management, zero trust architectures, and threat intelligence platforms — breaches continue to occur with troubling frequency. No single tool can cover every gap in an evolving and shape-shifting attack surface. The result: organizations are increasingly shifting from a “prevent everything” stance to a strategic posture that assumes adversaries will inevitably gain access.
This strategic pivot — often referred to as the “assume breach” model — marks more than just a technical or architectural evolution. It represents a mindset shift for CISOs and their teams. Under the traditional model, security programs are often judged by how perfectly they can prevent incidents — a nearly impossible standard in a world of zero-days, credential theft, and supply chain vulnerabilities. This burden of perfection creates unrealistic expectations and chronic stress within security organizations. Assume breach changes that. It acknowledges that mistakes will happen, that no system is flawless, and that breaches are inevitable. But it doesn’t signal defeat — it signals maturity. By planning for the breach, CISOs can relieve the pressure to be perfect and instead focus on resilience, visibility, and containment. This mindset empowers teams to architect layered defenses that don’t just try to keep attackers out, but catch them quickly once inside.
This is where deception technology becomes essential. When something inevitably slips through — whether it’s a misconfiguration, a phishing attack, or a compromised credential — deception acts as a backstop. Deception decoys, breadcrumbs, and honeytokens lie quietly in wait, embedded across IT, OT, and cloud environments. When attackers interact with these lures, they trigger high-fidelity alerts — often early in the MITRE ATT&CK chain — giving defenders a critical window to investigate and contain the intrusion before damage is done. Recent analysis from leading industry research firms describes deception as a preemptive security control — not just reactive — capable of reducing attacker dwell time, improving signal-to-noise ratios, and in some cases, driving the cost of a breach down to zero. That is, when deception triggers early, the attacker may never reach the sensitive systems or data they were targeting.
For CISOs, this approach is not only technically sound but politically smart. It provides a compelling narrative for the boardroom — one that reframes expectations. Rather than promising impenetrability, CISOs can communicate that assume breach is a mature, realistic posture, and that deception is the safety net that ensures threats are caught early, before reputational or financial damage occurs. The sections that follow explore this evolution in more detail, offering a lens on why prevention alone fails, how deception enables preemptive detection, and how leaders can operationalize this shift to build trust — both inside the organization and with the executive stakeholders who depend on it.
2. Why Prevention Alone — Even with Zero Trust — Isn’t Enough
Over the last 15 years, the cybersecurity world has undergone a seismic shift in architecture and mindset. The rise of mobile workforces, SaaS platforms, and cloud infrastructure made the traditional “castle-and-moat” model obsolete. Security leaders recognized that there was no longer a meaningful or enforceable perimeter. With users, data, and applications everywhere, the idea that anything “inside” the network could be inherently trusted collapsed under its own weight. This realization led to the widespread adoption of the Zero Trust model — a fundamental rethinking of trust and access. In a Zero Trust world, no device, user, or system is inherently trusted, even if it’s inside the network. Every access request must be verified continuously, and access is granted only in the context of known identity, behavior, and risk.
This shift was profound. It forced organizations to modernize identity infrastructure, tighten access policies, and adopt more granular controls. For many CISOs, implementing Zero Trust became a multi-year journey — and a board-level narrative. It was, and continues to be, a necessary evolution. But as transformative as Zero Trust has been, it is not the final destination.
2.1 The New Challenge: What Happens When Zero Trust Fails?
Zero Trust architectures are built to minimize the blast radius of compromise — but they do not make compromise impossible. Misconfigurations, credential theft, insider threats, and unknown vulnerabilities still create windows of opportunity for adversaries. Even mature Zero Trust implementations can be bypassed when attackers obtain valid credentials or exploit trust relationships between systems.
And here lies the dilemma: if an attacker breaches your environment despite Zero Trust, how do you know they’re there? How quickly can you detect them? This is where the Assume Breach mindset becomes essential — and why it is emerging as the next major shift in security thinking, equal in significance to the rise of Zero Trust itself.
2.2 Assume Breach: The Natural Evolution of Zero Trust
Assume Breach does not conflict with Zero Trust — it completes it. Where Zero Trust seeks to prevent unauthorized access, Assume Breach prepares for the inevitable moment when something slips through. This mindset acknowledges three truths:
- The attack surface is too vast and dynamic to defend perfectly.
- Security controls, no matter how advanced, can be misconfigured, bypassed, or silently fail.
- Detection and response must be as prioritized as prevention.
Zero Trust secures access. Assume Breach secures reality — the unpredictable, messy, human, and imperfect reality that CISOs operate in every day.
2.3 Why Detection Needs a Backstop
The missing piece in many Zero Trust environments is high-fidelity, low-noise detection that works when everything else has gone wrong. This is where deception technology plays a pivotal role. Deception tools embed realistic, interactive decoys and lures across IT, cloud, and OT environments — invisible to legitimate users but irresistible to attackers. When touched, these deception assets instantly trigger alerts — often early in the intrusion lifecycle — giving defenders precious time to investigate and respond before damage is done. This capability:
- Compensates for failure elsewhere in the stack
- Detects lateral movement post-authentication
- Drives attacker dwell time toward zero
- Reduces breach impact — in some cases to zero dollars
Unlike traditional detection tools that rely on signatures, heuristics, or behavior anomalies (and generate countless false positives), deception operates as a non-overlapping, proactive detection layer that activates only when something goes truly wrong.
2.4 A Second Mindset Shift for CISOs
Just as Zero Trust required a cultural and architectural shift, Assume Breach requires a mindset shift — one that CISOs must lead. It reframes the goal from “stop every attack” to “spot every attacker.” It accepts the impossibility of perfection and builds systems for resilience instead of just control. When layered on top of Zero Trust, Assume Breach — made actionable through deception — provides a fuller picture of modern cyber defense. It is not an abandonment of Zero Trust principles, but a natural, necessary extension of them.
And just as Zero Trust gave CISOs a powerful narrative for modernizing access and identity, Assume Breach gives them a new story to tell: one about preparedness, visibility, and minimizing impact when — not if — something goes wrong.
3. Assume Breach as a Maturing Strategy
For years, security leaders have quietly acknowledged what breach headlines have long made public: perfect prevention is a myth. Yet only recently has the security community begun to codify this reality into an actionable strategy. The Assume Breach mindset is the formalization of what defenders have known intuitively — that attackers will get in, and that the speed and precision of detection and response are what matter most. This mindset is not a retreat from proactive defense; it is a reorientation of priorities. And critically, it is no longer just a philosophical stance. It is a strategic framework — one now validated by both industry analysts and national security agencies.
3.1 From Analyst Theory to Operational Doctrine
Gartner has been among the first major analyst firms to elevate deception technology from a niche tool to a preemptive security control. In their recent guidance, Gartner positions deception as a proactive detection capability that enables early adversary engagement, improves incident response timing, and reduces the cost of breach by shrinking dwell time. Deception no longer lives in the shadows of the stack; it is recognized as a forward-looking technology that helps organizations “flip the economics of attack.”
This recognition reflects a broader shift in how CISOs and enterprise architects are thinking about detection: not as a last resort, but as a first line of insight. When attackers bypass preventive controls — and they will — early detection is the difference between a close call and a crisis.
3.2 NSA Guidance: Deception in the Real World
That shift from theory to practice is now visible in the public sector as well. In its joint Five Eyes cybersecurity advisory on Detecting and Mitigating Active Directory Compromises, the NSA, in coordination with allied intelligence agencies, explicitly recommends the deployment of Active Directory canaries and honeytokens as a key mechanism for breach detection. In the report, the NSA suggests placing user accounts or password objects in directories like SYSVOL that should never be accessed under legitimate conditions. If these decoy assets are ever touched — through credential harvesting or unauthorized authentication — they provide a high-fidelity signal of compromise, often revealing an attack in its earliest stages. This guidance signals something important: deception is no longer experimental. It has entered the canon of accepted security practice. When both Gartner and the NSA converge on deception as a necessary layer of defense — not as a backup plan, but as a preemptive detection mechanism — the strategy gains credibility, urgency, and momentum.
3.3 Institutionalizing Assume Breach
For CISOs, this convergence presents a compelling opportunity: to operationalize Assume Breach as a formal strategy within the security operating model. It’s a strategy that:
- Accepts that no control is perfect,
- Assumes that mistakes, misconfigurations, and blind spots will persist,
- And builds a detection capability that doesn’t require failure to be visible to end users before it is seen by defenders.
Deception technology becomes the means through which this strategy is realized. It acts as a tripwire woven through critical systems, silently waiting to reveal the adversary when they think they are still undetected. This evolution is not just technical — it’s institutional. Boards, regulators, and stakeholders increasingly expect that organizations not only defend, but prepare. Assume Breach is the clearest articulation of that expectation, and deception is its most effective enabler.
4. Deception as a Preemptive Backstop
The power of deception technology lies not only in its technical precision, but in its strategic placement. It is designed for the moment when something goes wrong — not after the damage is done, but in the narrow and critical window when an attacker first begins to move, explore, and escalate. In this sense, deception acts as a preemptive backstop — a safety net for the security architecture itself. Unlike traditional detection tools that analyze traffic, behavior, or signatures, deception creates an environment where attackers reveal themselves by making a wrong move. And unlike many tools that generate high volumes of alerts, deception operates quietly, producing high-confidence signals with low operational overhead.
4.1 How Deception Works
Deception platforms embed interactive decoys and lures throughout an organization’s infrastructure — from endpoints to cloud workloads, from Active Directory to CI/CD pipelines. These artifacts may include:
- Fake credentials or session tokens
- Decoy database records
- Simulated OT devices or point-of-sale terminals
- Phantom admin accounts in Active Directory
- Breadcrumbs left in developer environments
None of these assets serve a real business purpose — any interaction with them is, by definition, suspicious. This gives deception a unique edge: it detects true adversary behavior without relying on probability, thresholds, or human tuning. When touched, these assets trigger instant alerts, often catching the attacker early in the MITRE ATT&CK chain — during reconnaissance, credential access, or lateral movement stages.
4.2 The Preemptive Advantage
This early detection enables defenders to:
- Isolate affected systems quickly
- Investigate the adversary’s behavior in real-time
- Avoid data loss or system disruption
- Contain the blast radius before damage occurs
And in many cases, early detection prevents the breach from escalating into a reportable incident — shrinking potential breach costs from millions of dollars to near zero. This is why Gartner has begun to frame deception as a preemptive security control — not a reactive one. By deploying deception broadly across IT, OT, and cloud environments, organizations can build a detection capability that anticipates failure, rather than waits for symptoms to emerge.
4.3 A Complement, Not a Replacement
Deception is not a replacement for existing controls — it’s a complementary layer that makes them more effective. It works alongside:
- Zero Trust architectures, adding post-authentication detection
- EDR tools, by confirming when attackers evade agents
- SIEM/SOAR platforms, by feeding high-quality signals into automated response
- Cloud posture tools, by catching attackers in serverless and containerized environments
- OT/IoT systems, where signature-based defenses are limited or nonexistent
Its real value lies in what it catches when other tools miss — not because those tools are flawed, but because no architecture is immune to misconfigurations, blind spots, or human error.
4.4 Designed for the Real World
Deception is also uniquely suited to today’s hybrid enterprises. Modern deception platforms are:
- Agentless and lightweight, requiring no endpoint installations
- Scalable, with broad coverage across data centers, cloud, and edge
- Autonomous, with minimal tuning and low false positive rates
- Rapid to deploy, often operational within weeks
And perhaps most importantly, deception offers CISOs a measurable and reportable control — one that can demonstrate risk reduction to the board and auditors in clear, unambiguous terms.
5. Architecting for Resilience: Two Sides of Security, Two Different Problems
In the era of assume breach, cybersecurity architecture must be understood not as a single unified stack, but as two distinct — and equally essential — sides of the defensive equation.
On the left side sits the traditional best-practice architecture, built to align with standards like NIST, ISO, and CIS. This architecture includes a wide array of technologies — endpoint protection, identity governance, cloud workload security, vulnerability management, SIEM/SOAR integration, and more. It reflects decades of advancement and investment in trying to keep attackers out.
But this left-side architecture faces an overwhelming challenge: To succeed, it must be implemented perfectly — across an almost infinite attack surface. The perimeter is gone. Remote work, BYOD, SaaS apps, multi-cloud deployments, API integrations, and third-party risks have made it functionally impossible to know where the boundaries are. Every identity, device, app, or connection becomes a potential ingress point. Any gap, misconfiguration, or moment of human error can open the door. And attackers only need one.
5.1 The Infinite vs. the Finite