Skip to content

Two-Axis Positioning Model

Understanding Your Strategic Starting Point

Rather than using traditional maturity models that assume linear progression, this framework positions software factories on two independent dimensions that determine your optimal security approach.

Why Not Maturity Models?

Traditional security maturity models imply everyone should follow the same path. SF² recognizes that a 10-person startup with modern cloud infrastructure shouldn't implement security the same way as a 5,000-person enterprise with legacy systems—even if both need strong security.

The Strategic Positioning Framework

Organizations can be assessed along two critical axes:

Operational Complexity Axis (What You Manage)

Simple Operations: - Single or few teams - Basic processes - Straightforward compliance - Limited interdependencies - Centralized decision-making

Complex Operations: - Multiple teams/organizations - Sophisticated processes - Multi-jurisdictional compliance - Extensive service interdependencies - Distributed decision-making

Operational Readiness Axis (How You Operate)

Lower Readiness: - Manual processes - Legacy infrastructure - Limited automation - Tribal knowledge - Reactive operations

Higher Readiness: - Automated pipelines - Modern infrastructure - API-driven operations - Documented processes - Proactive operations

The Four Strategic Positions

These two axes create four distinct strategic positions, each with different security approaches:

Visionaries (Simple + High Readiness)

Characteristics: - Small teams with modern technology stack - Cloud-native infrastructure - Automated from inception - DevOps/Platform engineering culture - Fast iteration and experimentation

Security Approach: Enable security through modern tooling and self-service capabilities

Strategic Focus: Leverage technology advantages while building organizational scale

Typical Organizations: - Modern startups (post-Series A) - Cloud-native SaaS companies - Platform teams in larger organizations

Visionaries in Action

A 15-person SaaS startup running on AWS with full CI/CD automation, infrastructure-as-code, and comprehensive observability. They can implement policy-as-code and automated security testing from day one.

Leaders (Complex + High Readiness)

Characteristics: - Large-scale operations - Sophisticated DevOps practices - Comprehensive observability - Enterprise processes - Continuous learning culture

Security Approach: Orchestrate enterprise security architecture with continuous learning

Strategic Focus: Optimize security operations at enterprise scale while maintaining innovation

Typical Organizations: - Cloud-native enterprises - Modern financial services - Advanced SaaS companies - Tech giants

Leaders in Action

A 2,000-person organization with mature platform engineering, comprehensive automation, and sophisticated security orchestration. They build internal security platforms that enable hundreds of engineers.

Niche Players (Simple + Low Readiness)

Characteristics: - Small-scale operations - Legacy systems - Manual processes - Limited automation - Constrained resources

Security Approach: Focus on operational readiness foundations while managing essential security controls

Strategic Focus: Build operational capabilities while maintaining security coverage

Typical Organizations: - Early-stage startups - Small businesses - Non-tech companies with limited IT - Organizations in regulated industries with legacy systems

Niche Players in Action

A 20-person company with legacy infrastructure, manual deployments, and limited security tooling. They focus on basic security hygiene and gradual automation while managing business growth.

Challengers (Complex + Low Readiness)

Characteristics: - Large scale with legacy constraints - Technical debt - Mixed manual/automated processes - Organizational complexity - Transformation in progress

Security Approach: Pragmatic security within constraints while enabling gradual modernization

Strategic Focus: Balance current operational demands with strategic modernization investments

Typical Organizations: - Traditional enterprises undergoing digital transformation - Financial institutions with legacy infrastructure - Healthcare organizations - Government agencies

Challengers in Action

A 5,000-person enterprise with 20+ year-old systems, mixed infrastructure (on-prem + cloud), and security teams managing both legacy and modern systems. They implement hybrid security approaches while gradually modernizing.

Assessing Your Position

Use these questions to determine your organization's position:

Operational Complexity Assessment

Question Simple Complex
How many teams/organizations? 1-3 teams 10+ teams
Process sophistication? Basic workflows Enterprise processes
Compliance scope? Single jurisdiction Multi-jurisdictional
Service interdependencies? Few/simple Extensive/complex
Decision-making? Centralized Distributed

Operational Readiness Assessment

Question Lower Readiness Higher Readiness
Deployment process? Manual Fully automated
Infrastructure? Legacy/on-prem Cloud-native/hybrid
Documentation? Tribal knowledge Comprehensive docs
Observability? Limited/reactive Comprehensive/proactive
Change velocity? Weeks/months Hours/days

Why This Matters for Security

Your strategic position determines:

  1. Resource Allocation: What security investments make sense
  2. Implementation Approach: How to roll out security capabilities
  3. Timeline Expectations: How fast you can transform
  4. Tool Selection: Which security tools fit your operational reality
  5. Success Metrics: What good looks like for your organization

Common Mistake

Implementing Leaders-level security programs in a Challengers or Niche Players organization often leads to: - Failed tooling implementations - Frustrated security and development teams - Wasted budget on capabilities you can't operationalize - Security becoming a bottleneck instead of enabler

Strategic Movement Paths

Most organizations benefit from moving toward the Leaders position, but the path depends on your starting point:

Movement Strategies

Current Position Optimal Path Primary Investments Timeline Success Factors
Niche Players → Visionaries Infrastructure modernization Cloud platforms, DevOps toolchains, security automation 12-18 months High (single axis movement)
Niche Players → Challengers Complexity scaling Team expansion, process sophistication, compliance capabilities 18-24 months Moderate (scaling without readiness)
Visionaries → Leaders Complexity scaling Enterprise platforms, governance, multi-team coordination 24-36 months High (readiness enables scaling)
Challengers → Leaders Modernization while scaling Hybrid solutions, change management, technical debt remediation 36-48 months Moderate (dual transformation)
Challengers → Niche Players Simplification System consolidation, technical debt reduction, process streamlining 18-30 months Low (major organizational change required)

Executive Insight

The Challengers → Leaders path is the most common but also the most challenging. It requires simultaneous modernization and scaling—transforming operations while maintaining business continuity.

Using Position to Guide Security Strategy

Your position determines specific security implementation approaches:

For Visionaries: - Leverage cloud-native security services - Implement policy-as-code from inception - Build security into platform capabilities - Enable developer self-service

For Leaders: - Orchestrate enterprise security architecture - Build internal security platforms - Optimize at scale with automation - Continuous security improvement programs

For Niche Players: - Focus on foundational security controls - Manual but systematic approaches - Gradual capability building - Leverage managed security services

For Challengers: - Pragmatic hybrid security approaches - Risk-based prioritization (critical systems first) - Incremental modernization - Balance legacy and modern security controls


Next Steps

Now that you understand strategic positioning, explore the specific characteristics and recommended approaches for each position:

Explore Strategic Positions in Detail Learn About Movement Paths


Back to Universal Stewardship