2 Referencing Controls Across the Hierarchy

breakbeat, kawaii future bass afro-cuban jazz, appalachian folk flamenco, ambient techno chanson · 4:17

Listen on 93

Lyrics

[Verse 1]
Sarah reads the policy page, encryption rules spelled clear
"Sensitive data needs protection when it travels here"
But down in standards Mark defines the technical decree
"TLS one-point-two minimum, no weaker versions free"

[Chorus]
Same control, different floors
Policy to baseline doors
High to low, abstract to code
Four levels on the hierarchy road
Same intent, refined each stage
General words to config sage

[Verse 2]
Procedures show the clicking steps, navigate and choose
"Configuration menu waits, Security subdues"
Transport Encryption settings gleam, select the version strong
While baselines hold the syntax tight where Apache code belongs

[Chorus]
Same control, different floors
Policy to baseline doors
High to low, abstract to code
Four levels on the hierarchy road
Same intent, refined each stage
General words to config sage

[Bridge]
SSLProtocol minus all, plus TLS versions new
SSLCipherSuite defines the cryptographic crew
From boardroom SHALL statements down
To server configuration crown

[Verse 3]
Certificate authorities approved, the standard makes it known
While policy just mentions trust, procedure shows the zone
Each layer adds precision, drilling deeper than before
The same idea crystallized through hierarchy's core

[Chorus]
Same control, different floors
Policy to baseline doors
High to low, abstract to code
Four levels on the hierarchy road
Same intent, refined each stage
General words to config sage

[Outro]
One control cascades through all
From executive call
To command-line crawl
Hierarchy's wisdom, standing tall

← 1 Understanding the Document Pyramid | 3 Cross-Referencing Between Documents →