Skip to content

Security Architecture Explanation for Legal Review (Capital One 2019)

Use this to explain security architecture and key controls in language suitable for legal review; helps counsel understand technical design and risk.


Hallucinated writing examples

Scenario. In October 2020, in connection with regulatory response (OCC) and potential litigation (consumer class-action, In re Capital One Consumer Data Security Breach Litigation) (time), General Counsel (audience) requests a security architecture explanation for legal review. The Lead Security Engineer (role) is asked to produce a security architecture memo for legal review (type) that explains the AWS-hosted architecture, the July 2019 incident vector, and the post-remediation control environment in plain language suitable for counsel and disclosure. The document must be accurate as of the date of writing and cite the criminal case and Consent Order where relevant.

SECURITY ARCHITECTURE EXPLANATION FOR LEGAL REVIEW

To: Office of General Counsel
From: Lead Security Engineer, Cloud Security
Date: October 15, 2020
Re: Security Architecture Overview — AWS-Hosted Infrastructure; July 2019 Incident and Post-Remediation Control Environment

Scope. This memo summarizes the security architecture applicable to customer data stored in AWS-hosted infrastructure, as relevant to disclosure, litigation, or regulatory response. It describes the environment in which the July 2019 cybersecurity incident occurred, the vector used by the external actor, and the control environment after remediation. It is intended to support informed legal review and accurate disclosure. References: OCC Consent Order (Aug. 6, 2020), OCC NR 2020-98; United States v. Paige A. Thompson, U.S. District Court, W.D. Wash.; Capital One public statement (July 29, 2019).

Architecture overview. Customer-facing applications and supporting data that were affected in the July 2019 incident reside in our AWS-hosted infrastructure. Network segmentation separates tiers; perimeter controls include web application firewalls (WAF) and routing rules. At the time of the incident, a misconfiguration in one of the WAF components allowed the actor to obtain credentials and access data stored in our cloud environment. Following the incident, we have moved to config-as-code and peer review for perimeter controls and have deployed drift detection. Identity and access use AWS IAM (Identity and Access Management) with role-based access; a least-privilege review is in progress to reduce over-permissioned roles that contributed to the incident.

Security controls (post-remediation). (1) Perimeter. WAF and boundary rules are maintained in version control; changes require pull request and approval; drift detection alerts on unauthorized change. (2) Access. IAM roles are scoped to function; we are reducing broad and wildcard permissions. (3) Data. Encryption at rest and in transit; key management per policy. (4) Monitoring. Centralized logging with defined retention; alerting on anomalous access. Data flows enter via [described paths]; processing occurs within designated VPCs (virtual private clouds); egress is restricted and logged.

Incident vector and remediation. The July 2019 incident involved access obtained via a misconfigured WAF; the actor exploited this to obtain credentials and access customer data. That vector has been remediated; the vulnerable configuration was fixed in July 2019 and we have strengthened configuration governance as described above. Residual risk includes misconfiguration or insider access; mitigations include config-as-code, peer review, drift detection, logging, and independent testing.

Assumptions and limitations. This description is accurate as of the date above. It does not constitute a guarantee of invulnerability; it supports informed disclosure and legal review. Technical detail is available in appended diagrams and control documentation.


Official document (architecture in regulatory and litigation context)

The OCC consent order and DOJ criminal case referenced Capital One’s cloud architecture and configuration (e.g., WAF misconfiguration, IAM). Legal and regulatory scrutiny focused on how the environment was designed, operated, and governed—not only the exploit mechanics.

Architecture explanations for legal review are usually confidential; the consent order and court filings show the level of technical detail that enters regulatory and litigation.


Writing analysis

How architecture explanations for legal review are typically structured

  • Scope — Systems, data, or transactions in scope.
  • Architecture overview — High-level design (diagrams and narrative).
  • Security controls — How critical controls are implemented (access, encryption, monitoring).
  • Data flows and boundaries — Where data lives and how it is protected.
  • Risks and mitigations — Known risks and how they are addressed.
  • Assumptions and limitations — What the architecture does and does not guarantee.
  • Appendix — Glossary, acronyms, or detailed diagrams.

What to emulate

  • Plain-language summary first; technical detail in appendices so counsel can opine without becoming an engineer.
  • Align narrative with actual configs and assessments so legal opinions and disclosures are accurate.
  • Explicit “assumptions and limitations” so counsel knows what is not guaranteed.

What to improve

  • Avoid jargon in the main narrative; define acronyms and critical terms.
  • Tie each control to evidence (config, log, test) so the document supports defensibility.
Last updated: