Architecture Reference
This page describes the abstract reference model on which WAF++ is built, and provides decision guides for recurring architectural questions in cloud platforms.
Layer Model
WAF++ views cloud platforms through four stacked layers. Each layer has its own controls, best practices, and responsibilities.
| Layer | Components | WAF++ Relevance |
|---|---|---|
Infrastructure Layer |
Compute, storage, networking, KMS, IAM |
Pillar 1 (Security), Pillar 2 (Cost), Pillar 7 (Sovereign) – physical controls, encryption, tagging, region pinning |
Platform Layer |
Kubernetes, service mesh, CI/CD, observability, secret management |
Pillar 3 (Performance), Pillar 4 (Reliability), Pillar 5 (Operations) – scaling, SLOs, deployment automation |
Application Layer |
Microservices, APIs, databases, queues, batch jobs |
All pillars – workload-specific controls, tagging, resilience patterns |
Cross-Cutting Concerns |
Security, compliance, cost, resilience, sustainability |
All 7 pillars – overarching governance, audit trail, regulatory mapping |
The layers are not isolated: a decision at the infrastructure level (e.g. region pinning) pulls controls at the platform and application level (e.g. log residency, backup location).
Architecture Principles
WAF++ is built on seven architecture principles that apply across all pillars:
AP-1 – Explicit over Implicit
Every configuration that affects security, cost, or compliance must be explicitly defined in IaC. Implicit cloud defaults (regions, encryption, network ACLs) are not acceptable.
Relevant controls: SOV-020 (Region Pinning), SOV-050 (Key Ownership), COST-010 (Tagging)
AP-2 – Policy-as-Code
All policies – security, cost, residency – must be machine-readable and version-controlled. Manual policies in PDFs are not auditable and drift away from reality.
Relevant controls: SOV-010 (Data Residency Policy), COST-050 (ADR Cost Impact), COST-100 (Cost Debt Register)
AP-3 – Shift Left
Compliance and cost checks belong in the PR process, not in post-deployment audits.
wafpass in CI/CD is the primary implementation of this principle.
Relevant controls: COST-010, COST-020, SOV-020 – all with automated: true
AP-4 – Least Privilege by Default
All roles, network rules, and access rights are defined with minimal scope.
Wildcards (Action: *, 0.0.0.0/0) are explicitly prohibited.
Relevant controls: SOV-060 (Privileged Access), SOV-090 (Egress Control)
AP-5 – Data Sovereignty as a Design Principle
Data classification, jurisdiction requirements, and deletion obligations are considered at the first design of an architecture – not retroactively.
Relevant controls: SOV-010, SOV-020, SOV-030, SOV-040, SOV-050
Decision Guides
Multi-Cloud vs. Single-Cloud
| Criterion | Single-Cloud | Multi-Cloud |
|---|---|---|
Operational complexity |
Low – one provider, one tooling stack |
High – multiple control planes, different IAM models |
Vendor lock-in risk |
High – deep integration into proprietary services |
Low – portability via abstraction layer |
Compliance (GDPR/BSI C5) |
Simpler – one DPA, one audit scope |
More complex – multiple DPAs, cross-data flows to verify |
Cost |
Lower egress costs, volume discounts |
Higher egress costs, more complex reserved capacity planning |
WAF++ recommendation |
Default for new platforms |
Only when resilience or portability requirements demand it |
Before choosing multi-cloud: fully complete SOV-100 (Exit Plan) and COST-050 (ADR Cost Impact).
Managed Services vs. Self-Hosted
| Criterion | Managed Service | Self-Hosted |
|---|---|---|
Operational effort |
Low – provider handles patches, backups, HA |
High – full responsibility with the team |
Data sovereignty |
Limited – provider’s subprocessor chain applies |
Full – own control over data location and access |
Cost |
Predictable, but premium over self-hosted |
Variable, risk of hidden operational costs |
Compliance evidence |
Provider certificates (SOC2, BSI C5, ISO 27001) |
Own certification required |
WAF++ recommendation |
Default – operational effort always has hidden costs |
Only when data sovereignty or specific requirements force it |
Network & Zero-Trust Architecture
| Decision | WAF++ Guideline |
|---|---|
Segmentation |
Each workload in its own network segment (VPC/VNET/Subnet). No flat networks. |
Egress |
No public egress by default ( |
Ingress |
Only explicitly defined ports and CIDRs. No security groups with |
Internal communication |
mTLS preferred (service mesh). No plain HTTP between internal services. |
Zero Trust |
Identity rather than network position as the trust basis. Short token lifetimes, regular rotation. |
Encryption – Decision Matrix
| Data category | At Rest | In Transit | Key management |
|---|---|---|---|
PII / Health / Financial |
CMK (Customer Managed Key) mandatory |
TLS 1.2+ mandatory |
HSM or Cloud KMS with rotation (SOV-050) |
Operational / Internal |
CMK recommended, SSE-S3/AES256 acceptable |
TLS 1.2+ |
Cloud KMS, annual rotation |
Public / Logs (non-PII) |
SSE-S3 / AES256 sufficient |
TLS 1.2+ |
Cloud-managed |
Backup |
CMK recommended |
TLS 1.2+ |
Separate KMS region preferred (SOV-030) |
Maturity – Cross-Pillar Model
The WAF++ Maturity Model has 5 levels. The overall maturity of a platform is the minimum across all assessed pillars.
| Level | Name | Characteristics |
|---|---|---|
1 |
Ad hoc |
No structured controls. Individual decisions without documentation. High variance between teams. |
2 |
Standardized |
Basic policies documented. Manual implementation. First reuse of IaC modules. |
3 |
Integrated |
Controls integrated into CI/CD. Automated checks (wafpass). KPIs in place. Compliance reporting possible. |
4 |
Sovereign |
Fully automated and auditable. Drift detection active. Regulatory mappings evidenced. |
5 |
Optimized |
Continuous improvement. Automatic remediation. Real-time dashboards. Contribution to framework controls. |
Typical Starting Points by Context
| Context | Typical entry level | Priority |
|---|---|---|
Greenfield (new project) |
Level 2 |
Target Level 3 immediately: CI gates, tagging, region pinning |
Brownfield (existing platform) |
Level 1–2 |
Gap analysis first, then prioritized remediation plan |
Pre-audit (BSI C5 / ISO 27001) |
Level 2–3 |
Level 4 for Sovereign pillar is minimum requirement |
FinOps initiative |
Level 1–2 |
Level 3 for Cost pillar (tagging, budgets, CI gates) |
ADR Template with WAF++ Cost Impact
Architectural decisions (ADRs) should always include a cost impact section (WAF-COST-050):
# ADR-NNN: [Decision title]
## Status
Proposed | Accepted | Deprecated
## Context
[Why is this decision being made?]
## Decision
[What is being decided?]
## Consequences
[Positive and negative impacts]
## WAF++ Cost Impact
- **Ongoing costs:** [estimated monthly additional costs / savings]
- **Egress risk:** [Yes / No – justification]
- **Lock-in assessment:** [Reversibility level 1–5, 1=easily switchable]
- **Architectural cost debt:** [Does this create cost debt? If yes: add to cost debt register]
- **Reserved capacity:** [Is the resource suitable for commitment? If yes: set capacity-commitment tag]
Further Reading
-
Assessment Methodology – how architectural decisions are evaluated
-
Sovereign Design Patterns – concrete patterns for sovereign architectures
-
Architectural Cost Debt – cost debt as an architectural concept
-
Regulatory Mapping – which controls cover which frameworks
-
Control Schema – how controls are defined