Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)