Example
SECURITY = SECURITY_STANDARD × CANONIC
= Structure(security) × (C1, C2, Temporal, Relational, C5)
= owned security vertical
SECURITY = C1 ∩ C2 ∩ Temporal ∩ Relational ∩ C5 ∩ C6
= ENTERPRISE (#63)
Security always requires full Enterprise because:
Security MUST be implemented in multiple layers. No single control failure should compromise the system.
Example: Protecting a database requires: network segmentation, firewall rules, authentication, authorization, encryption at rest, encryption in transit, audit logging, and backup. Failure of any one layer does not expose data.
Access MUST be limited to the minimum necessary for the function.
Example: A developer needs read access to production logs for debugging. They MUST NOT have write access to production data, admin access to infrastructure, or access to unrelated systems.
Security posture MUST be continuously monitored and anomalies detected.
Example: A Security Information and Event Management (SIEM) system collects logs from all systems, correlates events, and alerts on suspicious patterns such as failed login attempts, unusual data access, or configuration changes.
Security incidents MUST have defined response procedures with clear ownership.
Example: When a potential breach is detected: (1) Contain the threat, (2) Preserve evidence, (3) Notify stakeholders, (4) Investigate root cause, (5) Remediate, (6) Document lessons learned. Each step has assigned roles and time requirements.
Security investments MUST be prioritized based on risk (likelihood × impact).
Example: A critical vulnerability in an internet-facing system with sensitive data (high likelihood, high impact) takes priority over a moderate vulnerability in an internal system with no sensitive data (low likelihood, low impact).
| Subdomain | Standard | Formula | Description |
|---|---|---|---|
| Information Security | ISO 27001 | ENTERPRISE | ISMS framework |
| Cybersecurity | NIST CSF | BUSINESS | Risk framework |
| Application Security | OWASP | (#25) | Secure development |
| Cloud Security | CSA CCM | BUSINESS | Cloud controls |
| Network Security | CIS Controls | BUSINESS | Network hardening |
| Identity Security | NIST 800-63 | BUSINESS | Authentication/authorization |
| Framework | Lattice | Scope |
|---|---|---|
| ISO 27001 | 6 governance checks | Information security management |
| NIST 800-53 | 6 governance checks | Security controls catalog |
| NIST CSF 2.0 | — | Cybersecurity framework |
| CIS Controls v8 | — | Prioritized controls |
| SOC 2 Type II | 6 governance checks | Service organization security |
| PCI-DSS v4.0 | 6 governance checks | Payment card security |
| CMMC 2.0 | 5 governance checks | Defense contractor security |
`` DECLARE(ISO27001) = ISO_27001 × CANONIC
Where: ISO 27001 provides Structure: - Annex A controls (93 controls in 4 themes) - Statement of Applicability - Risk assessment methodology - ISMS documentation
CANONIC provides Governance: - C1: Security policy as CANON - C2: Control evidence in COVERAGE - Temporal: Audit cycles, review periods - Relational: Scope boundaries - C5: Management review, enforcement
Result: ISO27001 = ENTERPRISE (#63)
Certification Lifecycle: Scope — Boundary defined Risk — Threats assessed Controls — Mitigations implemented Audit — Stage 1 + Stage 2 Certified — Certificate issued Maintain — Surveillance audits ``
`` DECLARE(ZeroTrust) = NIST_800-207 × CANONIC
Where: NIST 800-207 provides Structure: - Never trust, always verify - Assume breach - Verify explicitly - Use least privilege access
CANONIC provides Governance: - C1: Zero trust principles - C2: Verification logs - Temporal: Session validity, token expiry - Relational: Microsegmentation boundaries - C5: Policy enforcement points
Result: ZeroTrust = ENTERPRISE (#63)
Access Request Flow: Request — Subject requests access Verify — Identity validated Context — Time, location, device checked Authorize — Policy evaluated Grant — Access with constraints Monitor — Continuous validation ``
| Validator | Checks | Example Failure |
|---|---|---|
| C1 | Security policy exists | No access control policy |
| C2 | Control evidence documented | Missing penetration test |
| Temporal | Monitoring continuous | Gaps in log collection |
| Relational | Boundaries defined | Unclear system scope |
| C5 | Enforcement active | Disabled security controls |
| C6 | Framework conformance | Missing required controls |
To create a CANONIC security vertical:
Select security framework (ISO 27001, NIST, CIS) Create scope with CANON.md inheriting /SECURITY/ Define security policies as axioms Document control evidence in COVERAGE.md Establish monitoring (continuous temporal) Define boundaries (relational scope) Implement enforcement (operational controls) Map to framework (structural conformance)
Result: Owned security vertical with auditable compliance.