Built for you

For security architects
who own secure design and the control-to-architecture mapping

Security architects own threat models, design reviews, reference architectures, control-to-architecture mapping, and the evidence that the system shipped against the model the architecture committee signed off. SecPortal pairs engagement records for each architecture and design review, document management for threat models and architecture diagrams, findings management with CVSS 3.1 calibration, compliance tracking that maps a single review against ISO 27001, SOC 2, NIST SP 800-53, OWASP ASVS, PCI DSS, and NIST SP 800-207 Zero Trust at once, AI-assisted review summaries, repository connections for code-side validation, authenticated DAST for runtime checks, scheduled scans for drift detection, and an append-only activity log on one workspace, so the architect runs the design review queue, the control mapping, and the post-build evidence pull from one record rather than from a deck, a wiki, a spreadsheet, and a folder of PDFs.

No credit card required. Free plan available forever.

A security architecture platform built around the live engagement record

Security architects own threat models, architecture and design reviews, control-to-architecture mapping, reference architectures, and the evidence that the system shipped against the model the architecture committee signed off. The work spans secure-by-design intake for new services, recurring design reviews for changes that cross trust boundaries, threat modelling sessions, control narrative authoring against ISO 27001 Annex A and SOC 2 Trust Services Criteria and NIST SP 800-53 and OWASP ASVS and PCI DSS and NIST SP 800-207 Zero Trust, AI and ML system review intake, and the audit-evidence pull at surveillance time. Most programmes carry this work in a Confluence space, a recurring meeting calendar, a Slack channel, a Word folder of threat models, a spreadsheet for the review queue, a deck for the architecture committee, and a separate deck for the audit committee, and pay the cost in reconciliation hours each cycle and in residual risk between cycles.

SecPortal gives in-house security architects one workspace for engagement records per review, document management for threat models and architecture diagrams and decision records, findings management with CVSS 3.1 calibration that turns threat model output into a testable backlog, compliance tracking that maps a single architectural decision against multiple frameworks at once, authenticated DAST and code scanning that pair design decisions to runtime evidence, AI-assisted committee reporting that regenerates summaries from the live record, and an append-only activity log that ties the trail together. The architecture review reads from one record rather than from a deck, a wiki, a spreadsheet, and a folder of PDFs.

Capabilities security architects use day to day

One engagement record per architecture or design review

Open an engagement per architecture review, design review, threat model, or reference architecture publication. Scoping notes, the diagram, the data-flow overview, the trust boundary set, the misuse cases, and the reviewer panel attach as documents on the engagement record. The review queue, the participants, the in-scope services, and the deadlines live on one record rather than across a wiki, an inbox, and a calendar.

Threat model output as structured findings

STRIDE categories, abuse cases, data-flow trust boundary violations, and design decisions that fail review land as findings on the same engagement record. Each carries an auto-calculated CVSS 3.1 vector, severity, evidence, owner, and remediation status. The 300+ remediation template library populates concrete guidance, so the threat model output reads as a testable backlog rather than as a Word document the team will not reopen.

Multi-framework control-to-architecture mapping

Compliance tracking maps a single architectural finding or design decision against ISO 27001 Annex A, SOC 2 Trust Services Criteria, NIST SP 800-53 controls, OWASP ASVS verification levels, PCI DSS requirements, NIST CSF 2.0 functions, and NIST SP 800-207 Zero Trust principles on the same record. The reviewer captures the mapping once, and multiple coordinated audit packs read the same underlying trail.

Document management for design artefacts

Threat models, architecture diagrams, data-flow overviews, architectural decision records, reference architecture publications, control narratives, and review notes attach to the engagement record with provenance. The architect, the reviewer, the audit committee, and engineering read the same artefact set rather than three reconciled folders.

AI-assisted committee and audit reporting

Executive summaries, technical reports, decision-record exports, and compliance summaries regenerate from the live engagement data. The architecture committee, the steering group, and the audit committee read a controlled document rather than a copy-paste of last quarter, and the architect edits drafts rather than writes the deck from a blank page.

Append-only activity log across the workspace

Every finding update, scan run, document upload, retest run, exception, comment, and team change is recorded with the actor, the entity, the timestamp, and the action. Plan retention covers 30, 90, or 365 days, and CSV export keeps the architecture-review trail reproducible at audit time without a multi-team excavation of email and chat history.

How security architects operate review and evidence inside SecPortal

An architecture review function that holds up under audit and incident review operates on a small set of disciplines. Threat modelling, control mapping, design decisions, and post-build evidence inherit each one rather than carving out a parallel operating model per artefact.

  • Treat the architecture review as a structured engagement record rather than as a recurring meeting. Scoping notes, threat models, diagrams, decision records, findings, and audit-evidence artefacts live on the same record across the lifecycle of the design.
  • Capture threat model output as testable findings with CVSS 3.1 vector and severity, so STRIDE categories, abuse cases, and trust-boundary violations sit on the same backlog the rest of the security programme reads against rather than in a folder of design documents.
  • Map controls to the architecture once and let the same record produce ISO 27001, SOC 2, NIST SP 800-53, OWASP ASVS, PCI DSS, and Zero Trust evidence in parallel, so audit cycles read the same architecture trail rather than rebuilding the mapping per framework.
  • Pair the design decision to runtime evidence by running authenticated DAST against the deployed service, SAST and SCA from the Git provider, and external scans across the verified perimeter on the same engagement record as the review. Drift surfaces as a finding rather than as an asserted gap at audit time.
  • Use role-based access control to scope reviewers, security champions, engineering owners, and audit observers to the engagements they actually need, and require multi-factor authentication so the access model is enforced rather than asserted.
  • Maintain an append-only activity trail across every review, every threat model revision, every decision record, and every post-build scan run, so the question of why the system was approved against a specific residual risk has a single defensible answer at audit time.

From design review to post-build evidence, on one engagement record

The architecture review loop is open the engagement, run the threat model, map controls, pair the design decision to runtime evidence, hand off to engineering, and report to the committee. SecPortal runs a single workflow that the architect, the reviewer, the security champion in engineering, the compliance owner, and the security leader can all work against without re-keying state into another tool.

  1. 1Open an engagement against the architecture review, the design review, the threat model exercise, or the reference architecture publication. Scope the review, name the panel, attach the diagram and the data-flow overview as documents, and capture the misuse cases and the trust boundary set on the engagement record. The review queue reads from one workspace from the first cycle.
  2. 2Run the threat model and land the output as findings on the same engagement record. Each STRIDE category, abuse case, or trust-boundary violation that fails review becomes a finding with an auto-calculated CVSS 3.1 vector, severity, evidence, owner, and remediation status. The 300+ remediation template library populates concrete guidance for each class of issue.
  3. 3Map the architectural decisions and the open findings against the relevant control sets through compliance tracking. ISO 27001 Annex A, SOC 2 Trust Services Criteria, NIST SP 800-53 control families, OWASP ASVS verification levels, PCI DSS requirements, NIST CSF 2.0 functions, and NIST SP 800-207 Zero Trust principles coexist on the same record, so one mapping produces multiple coordinated audit packs.
  4. 4Pair the design decision to runtime evidence. Authenticated DAST against the deployed service, SAST and SCA from connected GitHub, GitLab, or Bitbucket repositories via OAuth, and external scanning across the verified perimeter run on the same engagement record as the architecture review. The scan diff endpoint surfaces new, fixed, and unchanged findings between runs so drift detection is a record event rather than a manual export-and-compare exercise.
  5. 5Hand the engagement record to engineering through role-based access control and the branded client portal. Security champions read the review state, the threat model output, the severity per finding, and the remediation guidance from the same record the architect operates on rather than from a ticket comment thread that loses the trust boundary context.
  6. 6Generate the architecture committee summary, the steering group deck, the audit committee report, or the regulator submission from the live engagement record through AI-assisted reporting. The committee reads a controlled document, the architect edits drafts rather than writes the deck from blank, and the audit trail follows the document set rather than the meeting calendar.

Where the architecture view connects to the rest of the workspace

Most architecture functions adopt SecPortal in three phases: bring the design review queue and the threat model output onto one engagement record so the backlog is testable, layer in control mapping across ISO 27001, SOC 2, NIST, OWASP ASVS, PCI DSS, and Zero Trust so a single architectural decision satisfies multiple audit packs, then pair design decisions to runtime evidence through authenticated DAST, code scanning, and external scans on the same record so drift is observable rather than asserted at audit time. The relevant feature, workflow, framework, and blog pages explain each phase in detail.

For architects evaluating against design-time, code-time, and runtime adjacencies

Architects evaluating consolidation tend to compare a workspace that records the review against a Confluence-plus-spreadsheet operating model, against an ASPM aggregator that sits above code-time scanners, and against an SCM-anchored code-graph platform. The detailed side-by-side comparisons cover what each shape covers and where it stops.

  • The SecPortal vs spreadsheets comparison covers the gap between a review queue carried on a shared sheet and an engagement record with structured findings, document management, control mapping, and an immutable activity trail.
  • The SecPortal vs ArmorCode comparison covers the trade-off between an ASPM aggregation layer above an existing scanner stack and a workspace where authenticated DAST, code scanning, external scans, the engagement record, and the architecture review all share one platform.
  • The SecPortal vs Cycode comparison covers the SCM-anchored code-graph ASPM shape against a workspace where the architecture review record, the threat model output, and the post-build runtime evidence sit on the same engagement.
  • The SecPortal vs DefectDojo comparison covers a self-hosted findings hub against a managed delivery workspace with engagement records, authenticated scanning, encrypted credential storage, AI reporting, and the branded client portal that engineering teams read from.

SecPortal is built for security architects who want one workspace for the verify-review-map-pair-handoff-report loop: engagement records per review, threat model output as testable findings, multi-framework control mapping, runtime evidence from authenticated DAST and code scans on the same record, AI-assisted committee reporting, role-based access for engineering and audit, multi-factor authentication, and an append-only activity log. Engineering gets a clearer signal on the design decisions they are building against, security leadership gets a defensible posture between reviews, compliance gets reproducible evidence across frameworks, and the architecture function stops being a parallel operating model the rest of security has to reconcile.

If your function sits closer to programme-wide leadership and board-level reporting than to the design review queue itself, the SecPortal for CISOs and security leaders page covers the programme-level reporting workflow that sits on top of the architecture record without rebuilding a deck every quarter.

If your function is application security inside engineering rather than cross-cutting architecture review, the SecPortal for application security teams page covers the DAST, SAST, SCA, and pentest finding consolidation that sits downstream of the architecture review.

If your function is product security with PSIRT-style intake and security champions inside engineering, the SecPortal for product security teams page covers the security review intake, the champions portal, and the disclosure lifecycle that sit alongside the architecture review function.

If your function spans compliance evidence and audit coordination more than secure design itself, the SecPortal for GRC and compliance teams page covers the audit-pack workflow that reads from the same engagement record the architecture function operates on.

The problems you face

And how SecPortal solves each one.

Architecture and design reviews live in a Confluence page, an email thread, a Slack channel, and a recurring meeting calendar, so the architect cannot answer which reviews are in flight, which are blocked on engineering, and which signed off against which control set without rebuilding the queue from scratch

Open an engagement per architecture review, design review, threat model, or reference architecture publication. Scoping notes, the architecture diagram, the data-flow overview, the trust boundary set, the misuse cases, and the reviewer panel attach as documents on the engagement record. Role-based access control scopes review participants to the engagements they own, and the activity log captures every state change so the queue reads from one workspace rather than three inboxes.

Threat models are produced as Word documents that nobody opens after the design review meeting, the STRIDE or PASTA or LINDDUN output never lands as testable findings on a backlog, and the system ships against assumptions the model already invalidated

Threat model output lands as structured findings on the same engagement record as the design review. Each STRIDE category, abuse case, or data-flow trust boundary that fails review becomes a finding with CVSS 3.1 vector, severity, evidence, owner, and remediation status. The 300+ remediation template library populates concrete guidance, and the activity log tracks every state change so the threat model survives contact with the build rather than ageing into a folder.

Control-to-architecture mapping is rebuilt from scratch every time the architecture is reviewed against a new framework, so an ISO 27001 surveillance audit, a SOC 2 Type 2 examination, a PCI DSS QSA review, and an OWASP ASVS verification each get a parallel narrative even when the same architectural decision satisfies all four

Compliance tracking lets one architectural finding or design decision map against ISO 27001 Annex A, SOC 2 Trust Services Criteria, NIST SP 800-53 controls, OWASP ASVS verification levels, PCI DSS requirements, and NIST SP 800-207 Zero Trust principles on the same record. The reviewer captures the control set once, and four audit packs read the same underlying mapping rather than rebuilding the trail per framework.

The Zero Trust programme, the secure SDLC, and the data classification scheme all assume that the design produced by architecture is the design that engineering shipped, but there is no record that the system was tested against the model the architecture committee signed off

Authenticated DAST against the deployed service, SAST and SCA from the Git provider via OAuth, and external scans across the verified perimeter all run on the same engagement record as the architecture review. The reviewer can see the production posture against the design decision, the scan diff endpoint surfaces new and fixed findings between runs, and the activity log records every test against every architectural assumption so the post-build evidence pull is reproducible rather than asserted.

Architectural decisions (the auth boundary moved to the API gateway, the storage layer adopted envelope encryption, the service mesh enforces mTLS between every workload) are captured in design-decision documents that drift from the running system within a quarter, and the architect cannot defend the current state without re-running the review

Architecture-decision artefacts attach as documents on the engagement record alongside the threat model and the diagram, and the runtime state of the system is observable on the same record through scheduled authenticated DAST, code scans on the connected repositories, and external scans across the verified perimeter. When the design drifts, a finding lands on the same record as the decision, and the architect reads the gap against the original assumption rather than against a guess.

Architecture reviews and threat models for AI/ML systems, LLM-backed applications, and agentic workflows need a different reading of the control set than traditional web applications, but the team has no record of which reviews touched which AI surface, what the model integration looked like at review time, and what the data flow into the model carried

Engagement records carry the engagement type, the in-scope services, and the documents attached to the review so AI/ML threat models, LLM red-team intake, and agentic-workflow reviews sit on the same workspace as web application reviews. Findings tag against the OWASP Top 10 for LLM Applications and against the same compliance frameworks as traditional reviews, so the architect reads model-touching exposures alongside the broader portfolio rather than as a separate spreadsheet.

Architecture review hand-off to engineering is a meeting and a Confluence page link, so engineering reads conclusions without the trust boundaries, the misuse cases, the proposed mitigations, or the residual risk that the architect actually signed off, and the design decisions get reinterpreted at build time

Engineering teams read the engagement record directly: scoping notes, threat model output as structured findings, severity and CVSS 3.1 score per finding, attached documents (diagram, data-flow, decision record), the named owner per item, and the remediation guidance from the 300+ template library. The branded client portal exposes a read-only view of the same record so security champions inside engineering work the architecture review handoff inside the workflow security already runs rather than rebuilding it in a ticket comment thread.

Architecture committees, security committees, and steering groups ask for the design-review backlog by severity, the architecture-debt aging view, and the open exceptions against the reference architecture, and the architect rebuilds each deck from a fresh export each cycle

The dashboard shows engagement state, finding aging by severity, exceptions with expiry dates, and remediation throughput across reviews. AI-assisted reporting generates committee-ready summaries, technical writeups, and decision-record exports from the live engagement data. The committee reads a controlled deck rather than a PDF copy-paste of last quarter, and the architect edits drafts rather than writes from blank.

The audit trail across architecture reviews, threat model versions, design decisions, and post-build evidence is rebuilt from chat history each cycle, so when an auditor or an incident review asks why the system was approved against a specific risk the trail does not survive contact with reality

The activity log records every finding update, scan run, document upload, retest run, exception, comment, and team change with the actor, the entity, the timestamp, and the action. Plan retention covers 30, 90, or 365 days, and CSV export keeps the architecture-review trail reproducible at audit time without a multi-team excavation of email and chat history.

Run the architecture review queue on one record

Engagements per review, threat models as structured findings, control mapping across frameworks, AI-assisted committee reporting, authenticated DAST and code scans against the same record, and the activity log on a single workspace. Free plan available.

No credit card required. Free plan available forever.