
AppSec Ownership Model
What happens when expectations stay implicit?
Everyone defines security for themselves.
If there is no explicit standard, security ends up being implemented according to personal judgment. What gets done, what gets skipped, and what is considered “good enough” depends on the individual, not on a shared expectation.
Implicit expectations do not create shared security standards.
Controls replace ownership.
When teams do not act on security expectations, the typical response is to add more controls. But controls that are not backed by ownership often just slow down delivery, create friction, and make software development less effective without meaningfully improving security.
More control does not fix missing ownership.
Everything depends on one person pushing.
If one person carries the whole security effort, the program only moves as long as that person keeps pushing. Without distributed ownership, AppSec becomes fragile, unsustainable, and hard to scale.
AppSec does not scale when ownership stays with one person.


Step 1: Define your vision for AppSec ownership
The AppSec Ownership Model gives you a structured reference for how ownership could be distributed across roles and AppSec domains.
It is not meant to be copied blindly. Use it to define your own vision for AppSec ownership and adapt it to your organization, your terrain.
It helps you clarify:
- Domain ownership: Which AppSec domains each role owns and where it supports.
- Accountability: What each role is accountable for, and what it explicitly is not.
- Interfaces: How roles interact with each other, including escalation paths.
The full model can be explored on my blog, role by role. But defining your vision is only the first step. Next, you need to understand your current state and make the gap visible.
Step 1: Define your vision for AppSec ownership


The AppSec Ownership Model gives you a structured reference for how ownership could be distributed across roles and AppSec domains.
It is not meant to be copied blindly. Use it to define your own vision for AppSec ownership and adapt it to your organization, your terrain.
It helps you clarify:
- Domain ownership: Which AppSec domains each role owns and where it supports.
- Accountability: What each role is accountable for, and what it explicitly is not.
- Interfaces: How roles interact with each other, including escalation paths.
The full model can be explored on my blog, role by role. But defining your vision is only the first step. Next, you need to understand your current state and make the gap visible.

From vision to reality

Step 2: Make the gap visible
The model gives you a vision. The next question is how far your current reality is from that vision. Where is ownership already clear? Where are expectations still implicit? Where does accountability still depend on one person pushing?
To answer that, you need to look at your current AppSec program in context of your terrain: roles, processes, decision paths, constraints, security culture, and the way teams actually work today.
You can do that analysis yourself. But if you want an outside view on the gap between vision and reality, the AppSec Terrain Check is built for exactly that.

Step 3: Move toward your vision
Once you know where you are and where you want to go, you can choose your next move. Start where the gap hurts most, especially where unclear ownership creates the most load.
Then check every measure against your ownership vision: does it move responsibility into the right place, or does it create more dependency? This might mean clarifying decision paths, adjusting routines, or involving the right roles earlier.
If you need support with that navigation, the Trail Guide may be an option after the Terrain Check, if we both see that working together makes sense.
