CISO Strategy Session - Meeting Notes

Meeting Objective

Demonstrate docs-as-code methodology and show how home enterprise patterns translate to CHLA production deployments.

Industry Context - Docs-as-Code Movement

Who’s doing this?

  • Google - All internal documentation in Markdown, version controlled

  • GitLab - Entire handbook (2000+ pages) is docs-as-code, public: handbook.gitlab.com

  • Stripe - Engineering docs built from source, API docs generated from code

  • Microsoft - docs.microsoft.com runs on docs-as-code (DocFX)

  • Spotify - Backstage developer portal, docs live with code

  • AWS - Documentation built from source with automated validation

Tools I’m Using

Tool What It Does Project Link

Antora

Multi-repo documentation sites

antora.org

AsciiDoc

Semantic markup language (richer than Markdown)

asciidoc.org

Asciidoctor

AsciiDoc processor (Ruby/JS)

asciidoctor.org

D2

Diagrams as code - declarative (Terrastruct)

d2lang.com

Mermaid

Diagrams as code - widely adopted (GitHub native rendering)

mermaid.js.org

age

Modern encryption (FiloSottile)

age-encryption.org

Pandoc

Universal document converter

pandoc.org

My Security Practices

Practice Implementation Details

Secrets Management

PRJ-SECRETS + gopass + age encryption

All credentials encrypted at rest; environment-specific secrets; hardware key integration

Email Security

PRJ-AERC (terminal email client)

OAuth2 tokens via scripts; no plaintext passwords; GPG-signed commits

Disaster Recovery

PRJ-RECOVERY + OPS-RECOVERY

LUKS header backups; SSH key escrow; documented recovery procedures

SSH Hardening

Ed25519 keys only; agent forwarding disabled

Hardware security keys (FIDO2); per-host configurations; jump host patterns

Post-Quantum Ready

ML-KEM hybrid key exchange

OpenSSH 9.x with sntrup761x25519-sha512@openssh.com; future-proofing against quantum attacks

Encrypted Backups

LUKS + age + NAS replication

Full disk encryption; encrypted archives; off-site backup verification

Security-Focused Implementations

Organization Approach

HashiCorp

All product docs in docs-as-code; Terraform, Vault, Consul docs are AsciiDoc/MDX

Cisco DevNet

API documentation generated from OpenAPI specs; learning labs in Markdown

NIST

OSCAL (Open Security Controls Assessment Language) - compliance as code

CIS Benchmarks

Moving to machine-readable formats for automated compliance

MITRE ATT&CK

Entire framework available as structured data (STIX/TAXII)

Why This Matters for Security

  • Auditability - Git history shows who changed what, when

  • Peer Review - PRs for documentation changes (SOX/HIPAA friendly)

  • Consistency - Templates enforce standards across teams

  • Automation - CI/CD can validate, publish, and alert on changes

  • Encryption - Sensitive docs protected at rest (age, GPG)

  • Compliance - Documentation changes are tracked, reviewable, auditable

Agenda (30 min)

Time Topic Duration

0:00

Introduction / Context Setting

2 min

0:02

Docs-as-Code Demo

8 min

0:10

Home Enterprise → CHLA Production Pattern

10 min

0:20

Zero-Trust Implementation

5 min

0:25

Questions / Next Steps

5 min

Section 1: Context Setting (2 min)

Key Points:

  • "I’ve built a documentation engineering system that enables rapid, consistent security documentation"

  • "Everything is version controlled, peer-reviewable, and produces multiple output formats"

  • "I test security patterns at home first, then adapt for CHLA production"

Section 2: Docs-as-Code Demo (8 min)

2.1 Show the Build System

Terminal commands:

# Show build script capabilities
head -80 .principia/scripts/build/build-adoc.sh

# Build a monthly compilation
.principia/scripts/build/build-adoc.sh 03_Captures/2026/02/MONTH-2026-02.adoc

# Show outputs
ls -la 03_Captures/2026/02/output/

Talking points:

  • "One source file, multiple outputs: HTML, PDF, DOCX"

  • "Watch mode for live editing - saves time"

  • "Encryption for sensitive documents"

  • "Batch builds for entire directories"

2.2 Show Variables/Attributes

Open in editor: 03_Captures/2026/02/MONTH-2026-02.adoc

Highlight:

// Variables - change once, updates everywhere
:prj-chla-linux-runbook: ../../../02_Assets/PRJ-ISE-CHLA-LINUX-ANTORA/...

// Document includes - modular composition
include::{day-01}[leveloffset=+1]

// Cross-references
link:{prj-chla-linux-runbook}[CHLA Linux Workstation Runbook]

Talking point: > "No hardcoded values. Change an IP address in one place, it updates across all documentation."

2.3 Show Templates

Terminal:

ls 02_Assets/PRJ-ANTORA/templates/

Talking point: > "Teams can spin up new documentation projects from templates. Consistent structure, immediate productivity."

Section 3: Home Enterprise → CHLA Pattern (10 min)

3.1 The Reference Implementation

Show Antora project count:

ls 02_Assets/ | grep -i antora | wc -l
# Answer: 10 Antora documentation projects

Open browser: Home Enterprise Antora Site

02_Assets/PRJ-ISE-HOME-LINUX-ANTORA/docs/asciidoc/build/site/prj-ise-home-linux/0.2.0/index.html

Talking points:

  • "Full ISE/802.1X/EAP-TLS implementation documented"

  • "Includes D2 diagrams - diagrams as code"

  • "Validation scripts embedded in documentation"

  • "1300+ lines on zero-trust dACL alone"

3.2 The Production Adaptation

Show side-by-side:

Home Enterprise CHLA Production

PRJ-ISE-HOME-LINUX-ANTORA

PRJ-ISE-CHLA-LINUX-ANTORA

Antora site (browsable)

Standalone runbook (PDF for team)

wpa_supplicant (Arch Linux)

NetworkManager (Ubuntu)

My workstations

Dr. Shahab’s research workstation

Open PDF: CHLA Runbook

02_Assets/PRJ-ISE-CHLA-LINUX-ANTORA/runbooks/output/linux-workstation-deployment-runbook.pdf

Talking point: > "Same security patterns, adapted for CHLA’s environment. Ben and Victor can follow the PDF step-by-step."

3.3 Show netapi Automation

Terminal:

# Check ISE session
netapi ise mnt session b4:e9:b8:f6:c8:17

# List authorization rules
netapi ise get-authz-rules "Wired Closed MAB"

# Force reauthentication
netapi ise mnt coa-disconnect b4:e9:b8:f6:c8:17

Talking point: > "I built tooling to automate ISE operations. Validation, session monitoring, policy changes - all scriptable."

Section 4: Zero-Trust Implementation (5 min)

4.1 dACL Design

Key principle: Deny internal first, permit only what’s needed

! Block lateral movement FIRST
deny ip any 10.0.0.0 0.255.255.255
deny ip any 172.16.0.0 0.15.255.255
deny ip any 192.168.0.0 0.0.255.255

! Then permit required services
permit udp any host <DC> eq 53      ! DNS
permit tcp any host <ISE> eq 8443   ! Posture
permit tcp any any eq 443           ! HTTPS

! Implicit deny all else

Talking point: > "Research workstations can reach the internet but cannot pivot to internal systems. Defense in depth: dACL + host firewall + VLAN segmentation."

4.2 Validation Evidence

Show test script output:

=== Testing BLOCKED traffic ===
Test 8: Ping to internal - should FAIL
[PASS] Internal ICMP blocked

Test 9: SSH to switch - should FAIL
[PASS] Switch SSH blocked

Test 10: SSH to NAS - should FAIL
[PASS] NAS SSH blocked

Talking point: > "Every deployment is validated with automated tests. Not just 'it works' - proof that security controls are enforced."

Section 5: Questions / Next Steps (5 min)

Anticipated Questions

Question Answer

"Can other teams adopt this?"

Yes - templates + build scripts. I can onboard teams.

"How does this integrate with CI/CD?"

Build scripts can run in pipelines. Git triggers → doc builds.

"What about sensitive documents?"

Age encryption built in. Encrypted files can be git-tracked safely.

"Timeline for CHLA Linux deployment?"

Dr. Shahab workstation this week. Parallel tracks: Ben (endpoint), Victor (certs), me (ISE policy).

Proposed Next Steps

  1. This week: Complete Dr. Shahab workstation deployment

  2. Next week: Document patterns for broader Linux deployment

  3. Ongoing: Offer docs-as-code onboarding for interested teams

  4. Future: Integrate with Sentinel for automated compliance reporting

Quick Reference - Files to Have Open

What Path

Build script

.principia/scripts/build/build-adoc.sh

Monthly worklog

03_Captures/2026/02/MONTH-2026-02.adoc

Home Enterprise Antora site

02_Assets/PRJ-ISE-HOME-LINUX-ANTORA/docs/asciidoc/build/site/…​/index.html

CHLA Runbook PDF

02_Assets/PRJ-ISE-CHLA-LINUX-ANTORA/runbooks/output/linux-workstation-deployment-runbook.pdf

Home Runbook PDF

02_Assets/PRJ-ISE-HOME-LINUX-ANTORA/runbooks/output/linux-eaptls-deployment-runbook.pdf

Templates

02_Assets/PRJ-ANTORA/templates/

Pre-Meeting Checklist

  • Terminal open with correct directory

  • Browser with Antora site loaded

  • PDF viewer with CHLA runbook open

  • Screen sharing ready

  • This notes doc open for reference


Meeting: CISO Strategy Session
Date: 2026-02-02 @ 4:00 PM Pacific
Prepared by: Evan Rosado