Improvement Workflow
Purpose
This page defines how security improvements are identified, prioritised, implemented and tracked within Scheol Security Lab.
The objective is to ensure that security is not treated as a static state, but as a continuous, risk-driven process.
Core Principle
Security evolves through controlled feedback loops, not one-time implementation
Improvements are driven by:
- identified risks
- control gaps
- detection limitations
- architectural constraints
- audit observations
Improvement Sources
Security improvements can originate from multiple inputs:
1. Risk Management
- new or updated risk entries
- changes in likelihood or impact
- emerging threat scenarios
2. Control Framework
- missing or weak controls
- incomplete control coverage
- inconsistencies between expected and implemented controls
3. Validation & Monitoring
- detection gaps
- lack of visibility
- ineffective monitoring coverage
4. Audit & Evidence
- missing or insufficient evidence
- traceability gaps
- audit observations or simulated findings
5. Architecture & Operations
- design limitations
- exposure issues
- operational constraints
Improvement Lifecycle
Each improvement follows a structured lifecycle:
1. Identification
- issue, gap, or opportunity is identified
- linked to a risk, control, or observation
2. Qualification
- assess impact on security posture
- determine urgency and scope
3. Prioritisation
- based on:
- risk level
- exposure level
- operational constraints
4. Decision
- improvement is:
- accepted
- postponed
- rejected (with justification)
5. Implementation
- technical or organisational changes are applied
- may involve architecture, controls, or monitoring
6. Validation
- verify that the improvement reduces risk or improves control effectiveness
7. Documentation Update
- update:
- risk register
- control status
- architecture documentation
- evidence records
Traceability Expectations
Each improvement should be traceable across:
- Risk → Control → Implementation → Validation → Evidence
Where applicable, improvements should reference:
- risk entries (R-XXX)
- decision records (ADR-XXX)
- control framework elements
- validation or monitoring results
Improvement Tracking
Improvements are tracked through:
- Security Debt Register (unresolved gaps)
- Decision Records (ADR) for structural changes
- Control Status for implementation tracking
This ensures visibility on:
- what is pending
- what is in progress
- what has been resolved
Governance & Ownership
-
Security Role (Sec)
Responsible for identifying, prioritising and validating improvements -
Operations Role (Ops)
Responsible for implementing infrastructure-related improvements -
Development Role (Dev)
Responsible for application and automation-related improvements
Current Maturity
At the current stage, continuous improvement is considered early-stage but structured.
Established
- identification of major security gaps
- linkage between risks and improvement actions
- initial use of decision records (ADR)
In Progress
- formalisation of improvement workflow
- consistency in tracking improvements
- better linkage across documentation layers
Planned / Next Phase
- systematic improvement tracking
- measurable validation of improvements
- integration with audit and evidence processes
This workflow is intended to progressively evolve into a repeatable and auditable improvement cycle.