Skip to content

Decision Framework

Reducing correlation has costs. This page provides frameworks for deciding when and how much to invest in diversity.


Investment = Cost(adding diverse component)
Return = Risk_reduction × Value_at_stake
Invest when: Return > Investment

But both sides of this equation are difficult to estimate:

  • Costs are tangible (money, complexity, latency)
  • Benefits are probabilistic (reduced risk of rare events)
  • Value at stake depends on scenario

This framework provides structured approaches to navigating this trade-off.


Use current correlation level and stakes to determine action:

StakesCorrelation Low (<0.3)Correlation Medium (0.3-0.5)Correlation High (>0.5)
Low✅ Accept✅ Accept⚠️ Consider monitoring
Medium✅ Accept with monitoring⚠️ Add one orthogonal check⚡ Invest in diversity
High⚠️ Verify estimate; add monitoring⚡ Significant investment🚨 Major redesign required
Existential⚡ Assume worst-case🚨 Assume worst-case🚨 Stop until resolved
  • ✅ Accept: Current architecture is adequate for the risk level
  • ⚠️ Consider/Verify: Investigate further, add monitoring, or make targeted improvements
  • ⚡ Invest: Allocate resources to diversification
  • 🚨 Major action: This is a serious problem requiring significant intervention
LevelDefinitionExamples
LowMistakes are cheap and reversibleDraft generation, internal tools, prototypes
MediumMistakes cause meaningful cost but are recoverableCustomer-facing features, financial transactions < $10K
HighMistakes cause serious harm, partially recoverableProduction deployments, medical recommendations, legal advice
ExistentialMistakes could be catastrophic or irreversibleSafety-critical systems, actions affecting many people, irreversible decisions

Cost TypeDescriptionTypical Range
Multiple vendorsContracts, integration, relationship management2-5× single vendor
Diverse expertiseSpecialists for each approach1.5-3× homogeneous team
Integration complexityMaking different systems work together20-50% additional dev time
Operational overheadMonitoring, maintaining multiple systems1.5-2× single system
LatencyAdditional verification steps take time+50-200ms per layer
Cost TypeDescriptionMitigation
Coordination overheadDifferent systems must agree on interfacesStrong contracts, versioning
Conflicting resultsDifferent methods may disagreeClear escalation rules
Lowest common denominatorOutput constrained by weakest linkWeight by reliability
Expertise fragmentationNo one understands the whole systemDocumentation, cross-training
Debugging difficultyHarder to trace issues across diverse componentsComprehensive logging
Total Diversity Cost =
(Vendor costs × number of vendors) +
(Personnel cost × expertise breadth) +
(Dev time × integration complexity factor) +
(Ops cost × number of systems) +
(Latency cost × latency sensitivity)
Example:
- 3 vendors at $50K/year each = $150K
- 2 additional specialists at $200K = $400K
- 6 months integration at $50K/month = $300K
- 3× ops overhead at $100K = $100K additional
- 200ms latency acceptable = $0
Total: ~$950K first year, ~$650K ongoing

Risk = P(threat) × P(all defenses fail | threat) × Impact
Without diversity (high correlation):
P(all fail) ≈ P(one fails) = 0.1
With diversity (low correlation):
P(all fail) ≈ P(one fails)^N = 0.1^3 = 0.001
Risk reduction factor = 100×
Expected Loss = Risk × Impact
Before:
- Risk: 5% (high correlation)
- Impact: $10M
- Expected Loss: $500K/year
After diversity investment:
- Risk: 0.1% (low correlation)
- Impact: $10M
- Expected Loss: $10K/year
Value of diversity: $490K/year in reduced expected loss
BenefitValueNotes
Reputational protectionHighOne major incident can cost years of trust
Regulatory complianceVariableSome industries require diversity
Sleep at nightPricelessConfidence in system robustness
Organizational learningMediumDiverse approaches bring diverse insights
Incident responseHighMore options when one system fails

Correlation is acceptable when:

  • Learning what works
  • Requirements still evolving
  • Stakes genuinely low

Transition point: When moving from prototype to production, reassess correlation.

  • Mistakes are cheap
  • Quick recovery possible
  • Limited blast radius

Watch for: Scope creep that increases stakes without reassessing architecture.

  • All threats come from same source (rare in practice)
  • One type of verification genuinely sufficient
  • Attack surface is narrow

Caution: Threat models often underestimate diversity of threats.

  • Diverse approaches don’t exist
  • Cost truly exceeds benefit
  • Better to have correlated protection than none

But: Revisit as new approaches become available.

  • Stakeholders informed of correlation
  • Residual risk formally accepted
  • Compensating controls in place (e.g., insurance)

Document: Risk acceptance decisions for future reference.


Correlation is unacceptable when:

  • Human life or safety at stake
  • Healthcare decisions
  • Infrastructure control
  • Weapons systems

Standard: Assume worst-case correlation; require fundamentally different methods.

  • Deletions that can’t be undone
  • Financial transfers
  • Public communications
  • Physical actions

Standard: Correlation tax of 10× or less; human oversight for high-stakes.

  • Sophisticated attackers expected
  • Nation-state threat models
  • High-value targets

Standard: Assume attackers will find and exploit correlations.

  • Financial systems with large exposure
  • Critical infrastructure
  • Widely-used platforms

Standard: Worth attacker’s investment to find correlated weaknesses.

  • Industry standards require diversity
  • Audit requirements
  • Compliance obligations

Standard: Meet or exceed regulatory requirements.


Questions:
- What's the worst-case outcome if all verification fails?
- Is the outcome reversible?
- How many people/dollars affected?
- What's the reputational impact?
Stakes Level: [ Low | Medium | High | Existential ]
Questions:
- Do verification layers use the same provider?
- Were they designed by the same team?
- Do they share training data or methodology?
- Can red team find inputs that evade multiple layers?
Evidence-based correlation estimate: ___
Confidence in estimate: [ Low | Medium | High ]
Stakes: ___
Correlation: ___
Matrix recommendation: ___
If matrix recommends investment:
Estimated cost: $___
Estimated risk reduction: ___ %
Value of risk reduction: $___
ROI: ___
Proceed? [ Yes | No | Need more information ]
If proceeding:
Priority interventions:
1. ___
2. ___
3. ___
Timeline: ___
Resources: ___
Success metrics: ___
Review date: ___

When you’re uncertain about correlation level:

Conservative approach:
- Assume correlation is one level higher than estimated
- Verify before assuming independence
- Treat "I don't know" as "probably correlated"
When to investigate further:
- Stakes are Medium or higher
- Correlation estimate confidence is Low
- System is changing rapidly

When the system is evolving quickly:

Risks:
- New connections added without review
- Optimizations introduce coupling
- Team changes affect organizational diversity
Mitigations:
- Architecture review gates
- Automated correlation monitoring
- Regular re-assessment schedule
- "Coupling budget" with explicit limits

When ideal diversity isn’t affordable:

Prioritization framework:
1. Highest-stakes components first
2. Highest-correlation pairs first
3. Cheapest interventions first
4. Monitoring before mitigation
Partial measures:
- Diverse monitoring even if execution is homogeneous
- Human oversight at critical points
- Strong rollback capabilities
- Incident response preparation

Decision Heuristics:
1. When in doubt, assume correlation is higher than it appears
2. Stakes determine how much correlation is acceptable
3. Diversity has costs—don't over-engineer low-stakes systems
4. Some correlation is irreducible—know your limits
5. Document risk acceptance decisions
6. Reassess when stakes, system, or threat model change

See also: