The documentation system tenet of minimal secrecy states that most documentation in an enterprise should be accessible to the extended enterpriseâall employees and partnersâby default. The tenet supports the principle of shared responsibility by isolating and removing sensitive information from general documentation so that it can be opened up to the wider enterprise.
This tenet prevents the formation of a feudalistic information political system whereby the management of information by individual business units or functions âreport only limited information to the overall corporationâ. (Davenport et al., 1992). In their study of a U.S. electronic firm which was organized along product lines, they noted that each production division head was informally referred to as âbaronsâ and shared the âmost limited amounts of dataâ with their subsidiary head. New information technology, and associated policies have exacerbated this problem.Â
Nothing is more detrimental to an enterpriseâs DocOps efforts than a dogmatic adoption of the need-to-know principle (NIST, n.d.) by the InfoSec, Information Management, and GRC (Governance, Risk, and Compliance) departments. The need-to-know principle states that users shall only have access to the information that their job function requires, regardless of their security clearance level or other approvals.
The thoughtless enforcement of the need-to-know principle is antithetical to the principle of shared responsibility which encourages sharing and connecting information, as opposed to locking it down in silos behind access control walls.
In Haeckel & Nolanâs (1993) three-prong Corporate IQ model, sharing (in addition to connecting and structuring, which we will refer to in the tenets of connected content, and emergent structure, respectively) is essential. In their study, they noted that âsharing makes possible coordinated effort and, therefore, the benefits associated with teamwork, integration, and extended scope.â and that âgetting everyone on the same page in a large business requires an institutional capability to share dataâ.Â
To establish an effective culture of shared responsibility, we need to create the conditions that allow two seemingly unrelated users to benefit, create, and add to an enterpriseâs body of documentation without the limitation that they can only collaborate if they belong to the same domain, team, or project.Â
But what about personal identifiable information, credit cards, or, perhaps âa secret business strategy to take over the competitionâ? First of all, this tenet does not suggest that an enterpriseâs body of documentation should be published on the public internet. The goal is to make most documentation accessible to members of the extended enterprise by default, and reduce to a bare minimum the information real estate which requires anything other than default access rights. This is what minimum secrecy is all about: open access by default, secrecy by exception.
To add to this, minimal secrecy should not be viewed as a two bucket category system in which one bucket is called âdefaultâ and the other one is called âsecretsâ. Such an approach results in everyone creating content in the secrets bucket to avoid accidentally misplacing âhush hushâ content into the default one. Instead, minimal secrecy requires a relentless pursuit to document the majority of an enterpriseâs truth in a relatively open and secure fashion, extracting out and isolating those few elements which may require secrecy.
Minimal secrecy is not a new idea. Steele (1993) argued that the notion of secrecy is often a fallacy even in most military contexts. He noted that âmost secrets start out as non-secretsâ and that âit is only after a certain âcritical massâ has been reached that some authority decides to classify or restrict information.â
Likewise, minimal secrecy has been in the software engineering world for years. Security sensitive items such as passwords, private keys, and private certificates are kept outside an applicationâs source codeâwhich may be stored in a public repository such as GitHub. Such sensitive items are stored securely and separately using specialized applications such as secrets and certificate managers. There is no reason as to why regular documentation shouldnât be subjected to the same principlesâto derive similar benefits.
The storing of sensitive information using specialized, advanced mechanisms results in a win-win, both for the InfoSec departmentâwhich benefits from advanced security beyond mere access controlâand the wider enterprise, which benefits from increased productivity thanks to empowering its workforce with open documentation.
Minimal secrecy also supports the principle of security by design, as opposed to security through obscurity. What this means is that if an enterprise can be compromised by just learning the specifications or information about one or more of its systemsâbarring, of course, passwords, certificates, access tokens, etcâthen, it is not secure by design. Secrecy must never be the mechanism through which an enterprise is secured unless the secret poses a legal, financial or competitive risk.
Minimal secrecy is also a natural property of monorepos. A monorepo (Potvin & Levenberg, 2016) is a software-development approach, popularized by Google in which projects store their source and assets in the same repository so that it is easy for all participantsâno matter what domain or which projectâto understand how dependencies are implemented, and eventually improve them, fostering collaboration. It is essentially an approach for co-creation, but applied within the software engineering domain.
© 2022-2024 Ernesto Garbarino | Contact me at ernesto@garba.org