Information Security Governance in Distributed and Decentralized IT Systems: A Coordination-Theoretic Perspective
DOI:
https://doi.org/10.66320/frxgyz25Keywords:
Information Security Governance; Distributed Systems; Decentralized IT; Cloud and Edge Computing; Digital Ecosystems; Polycentric Governance; Coordination Theory; Policy-as-Code.Abstract
The rapid proliferation of distributed and decentralized IT architectures—ranging from cloud-native microservices and edge computing to blockchain-based ecosystems—has fundamentally eroded the efficacy of traditional, centralized information security governance (ISG). As organizational perimeters dissolve into federated, multi-actor, and ephemeral environments, the hierarchical model of a single governing authority enforcing uniform policy becomes not only obsolete but actively detrimental to system resilience. This research examines the critical governance tension between the necessity for central control to manage aggregate risk and the operational reality of local autonomy required for distributed system performance. By adopting a coordination-theoretic lens, this article conceptualizes security governance not as a static command structure but as a dynamic, distributed coordination problem. The study identifies and analyzes specific mechanisms for aligning security responsibilities, decision rights, and assurance processes across autonomous nodes without relying on a single root of trust or a monolithic control plane. Key insights reveal that effective governance in decentralized environments depends on the implementation of polycentric decision-making frameworks, the utilization of automated policy-as-code enforcement, and the adoption of consensus-based assurance mechanisms. The findings suggest that a shift from "governance by mandate" to "governance by protocol" is essential for securing the next generation of digital infrastructure.
Downloads
Published
Issue
Section
License
This is an open access journal which means that all content is freely available without charge to the user or his/her institution. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles, or use them for any other lawful purpose, without asking prior permission from the publisher or the author. This is in accordance with the BOAI definition of open access. Articles are licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0).
