{"guid":"d3c88c80-227d-59e2-8570-014f2e06bbca","title":"Using deployment diagrams to explain architecture and security to everybody","subtitle":null,"slug":"why2025-211-using-deployment-diagrams-to-explain-architecture-and-security-to-everybody","link":"https://program.why2025.org/why2025/talk/PRV9UP/","description":"This talk will enable you to lead architecture conversations and discuss their security options through an informal diagramming technique. I will use examples such as key/encryption architectures, DevOps, and even your home music system.\n\nPresentation at https://digitalinfrastructures.nl/why2025/\n\nYou have seen many diagrams of computer and information systems in your career. They have been around since the early days of computing. They can be useful, but there are a few typical problems with them:\n•\tThey are drawn with obscure symbols that are only understood by architects\n•\tThey are drawn in an inconsistent way\n•\tThey are not used to their fullest potential.\nIn my practice I have run into these problems often, and I have found ways to turn a certain type of diagram, a simplified version of deployment diagrams, into the cornerstone of explanation of what goes on in cloud and cybersecurity.\nIn the talk I will lead you through the basic principles, and a few examples. This will enable you to lead architecture conversations and discuss their security options. I will use examples such as key/encryption architectures, DevOps, and even your home music system.\n\nLicensed to the public under https://creativecommons.org/licenses/by/4.0/","original_language":"eng","persons":["Peter van Eijk"],"tags":["211","2025","why2025","Wonderful creations","Cassiopeia","why2025-eng","Day 5"],"view_count":111,"promoted":false,"date":"2025-08-11T20:00:00.000+02:00","release_date":"2025-08-12T00:00:00.000+02:00","updated_at":"2026-04-07T12:30:08.203+02:00","length":2374,"duration":2374,"thumb_url":"https://static.media.ccc.de/media/events/why2025/211-d3c88c80-227d-59e2-8570-014f2e06bbca.jpg","poster_url":"https://static.media.ccc.de/media/events/why2025/211-d3c88c80-227d-59e2-8570-014f2e06bbca_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/why2025/211-d3c88c80-227d-59e2-8570-014f2e06bbca.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/why2025/211-d3c88c80-227d-59e2-8570-014f2e06bbca.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/why2025-211-using-deployment-diagrams-to-explain-architecture-and-security-to-everybody","url":"https://api.media.ccc.de/public/events/d3c88c80-227d-59e2-8570-014f2e06bbca","conference_title":"What Hackers Yearn 2025","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025","related":[],"recordings":[{"size":254,"length":2374,"mime_type":"video/webm;codecs=av01","language":"eng","filename":"why2025-211-eng-Using_deployment_diagrams_to_explain_architecture_and_security_to_everybody_av1-hd.webm","state":"new","folder":"av1-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-12T16:43:31.843+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/av1-hd/why2025-211-eng-Using_deployment_diagrams_to_explain_architecture_and_security_to_everybody_av1-hd.webm","url":"https://api.media.ccc.de/public/recordings/89947","event_url":"https://api.media.ccc.de/public/events/d3c88c80-227d-59e2-8570-014f2e06bbca","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":36,"length":2374,"mime_type":"audio/mpeg","language":"eng","filename":"why2025-211-eng-Using_deployment_diagrams_to_explain_architecture_and_security_to_everybody_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2025-08-12T14:53:46.529+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/mp3/why2025-211-eng-Using_deployment_diagrams_to_explain_architecture_and_security_to_everybody_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/89816","event_url":"https://api.media.ccc.de/public/events/d3c88c80-227d-59e2-8570-014f2e06bbca","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":95,"length":2374,"mime_type":"video/webm","language":"eng","filename":"why2025-211-eng-Using_deployment_diagrams_to_explain_architecture_and_security_to_everybody_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-08-12T16:50:39.646+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/webm-sd/why2025-211-eng-Using_deployment_diagrams_to_explain_architecture_and_security_to_everybody_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/89952","event_url":"https://api.media.ccc.de/public/events/d3c88c80-227d-59e2-8570-014f2e06bbca","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":305,"length":2374,"mime_type":"video/webm","language":"eng","filename":"why2025-211-eng-Using_deployment_diagrams_to_explain_architecture_and_security_to_everybody_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-12T16:33:08.477+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/webm-hd/why2025-211-eng-Using_deployment_diagrams_to_explain_architecture_and_security_to_everybody_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/89942","event_url":"https://api.media.ccc.de/public/events/d3c88c80-227d-59e2-8570-014f2e06bbca","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":99,"length":2374,"mime_type":"video/mp4","language":"eng","filename":"why2025-211-eng-Using_deployment_diagrams_to_explain_architecture_and_security_to_everybody_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-08-12T14:55:37.365+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/h264-sd/why2025-211-eng-Using_deployment_diagrams_to_explain_architecture_and_security_to_everybody_sd.mp4","url":"https://api.media.ccc.de/public/recordings/89837","event_url":"https://api.media.ccc.de/public/events/d3c88c80-227d-59e2-8570-014f2e06bbca","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":23,"length":2374,"mime_type":"audio/opus","language":"eng","filename":"why2025-211-eng-Using_deployment_diagrams_to_explain_architecture_and_security_to_everybody_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2025-08-12T14:53:38.293+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/opus/why2025-211-eng-Using_deployment_diagrams_to_explain_architecture_and_security_to_everybody_opus.opus","url":"https://api.media.ccc.de/public/recordings/89814","event_url":"https://api.media.ccc.de/public/events/d3c88c80-227d-59e2-8570-014f2e06bbca","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":336,"length":2374,"mime_type":"video/mp4","language":"eng","filename":"why2025-211-eng-Using_deployment_diagrams_to_explain_architecture_and_security_to_everybody_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-12T14:42:21.248+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/h264-hd/why2025-211-eng-Using_deployment_diagrams_to_explain_architecture_and_security_to_everybody_hd.mp4","url":"https://api.media.ccc.de/public/recordings/89800","event_url":"https://api.media.ccc.de/public/events/d3c88c80-227d-59e2-8570-014f2e06bbca","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"}]}