Principled Pragmatism: How to Balance Security Ideals With Legacy System Realities
Nikoloz Kokhreidze
Stop choosing between ideal security and operational constraints. Learn how to implement a staged security roadmap that bridges the gap between legacy systems and modern protection standards.
You're standing at a crossroads. In one hand, you hold the blueprint for your perfect security architecture – modern, robust, and aligned with every industry best practice. In the other, you clutch a stack of reports about legacy systems that power critical business functions but haven't seen updates since Obama's first term.
Sound familiar?
If you're a security leader caught between idealism and operational constraints, you're not alone. I've spent over a decade navigating this exact tension. The question that haunts many of us remains: Should we aim for security perfection and make exceptions when needed, or should we build our security approach around existing business constraints from the start?
Your answer to this dilemma shapes your entire security program, team culture, and the value you deliver to your organization.
The Idealist's Trap (And Why I Fell Into It)
Early in my career, I was the definition of a security purist. I'd walk into meetings with vendors and business stakeholders armed with a comprehensive security wish list. "We need zero trust architecture," I'd declare. "We need to segment all networks, implement strong encryption everywhere, and replace anything older than three years."
People would nod, seeming to agree. Then came implementation time.
"That legacy ERP system? It can't support modern authentication protocols."
"That specialized manufacturing software? The vendor went out of business in 2014."
"That custom-built application? The developer who built it retired years ago."
My perfect security vision crashed against the rocks of operational reality. Business units pushed back. Relationships grew tense. Eventually, I realized my approach was fundamentally flawed.
I was building security castles in the sky without understanding the ground beneath them.
The Operational Realist (And Why That's Not Enough Either)
Some security leaders take the opposite approach. They begin with business needs and build security measures around existing constraints. This approach has merits – it acknowledges reality, minimizes business disruption, and often faces less resistance.
But it comes with serious downsides.
When you start by accepting all operational limitations as fixed, you often end up with inadequate security. You stop pushing for necessary changes. You stop challenging the status quo. And most dangerously, you become the department of "no, we can't secure that properly" rather than "yes, and here's how."
As Michael Oberlaender notes, security needs to "blend into the overall business processes and operational efficiency – so, instead of becoming a roadblock in every single undertaking, ensure that security is becoming part of the process." But that doesn't mean accepting every limitation.
The Third Way: Principled Pragmatism
After years of wrestling with this dilemma, I've discovered there's a third path. I call it Principled Pragmatism. It combines the best of both approaches while avoiding their pitfalls.
Here's how it works:
Member-Only Content
Join Mandos to Continue Reading
Get instant access to this article and the Mandos Brief - your weekly 10-minute security leadership update.