Earned Secure Attachment: Becoming Secure
There is a concept in attachment psychology that remains strangely under-discussed, despite being perhaps the most hopeful in the entire field: earned secure attachment. The idea, in one sentence: you can become secure even if you never were.
This is an idea that changes everything.
Because in prevailing discourse -- including among some professionals -- attachment style is often presented as a nearly permanent trait, an imprint of early childhood that follows us for life. You are anxious, avoidant, disorganized, and you stay that way. You can learn to "manage," but the core doesn't change.
🧠
Vous reconnaissez ces schemas en vous ?
Un assistant IA specialise en theorie de l'attachement et des schemas — 50 echanges pour comprendre vos patterns.
Explorer en conversation — 1,90 €Disponible 24h/24 · Confidentiel
Except that's not what the data shows. Research in developmental psychology -- notably the work of Mary Main at the University of California, Berkeley, and Peter Fonagy at University College London -- demonstrates that a significant proportion of adults who experienced difficult early relational experiences now function with earned secure attachment. They haven't forgotten their past. They don't deny it. But they have integrated it in a way that allows them to relate flexibly, confidently, and openly.
This article explores how this process works and what cognitive behavioral therapy (CBT) can concretely contribute toward achieving it.
What "Secure" Really Means
Before going further, let's clarify what we mean by "secure attachment." It is not the absence of fear, doubt, or vulnerability in relationships. It is not blind trust in others either. Secure attachment is the ability to:
- Tolerate intimacy without drowning in it (unlike the anxious type who merges)
- Tolerate distance without shutting down (unlike the avoidant type who withdraws)
- Ask for help when needed, without excessive shame
- Offer support to others without losing yourself
- Navigate conflicts without disagreement becoming an existential threat
Internal Working Models: The Relational World Map
John Bowlby, the founder of attachment theory, introduced the concept of "internal working models" to describe the mental representations we build in early childhood from our first relational experiences.
These models function as a cognitive map of the relational world. They contain two fundamental pieces of information:
If the child received consistent, warm, and predictable responses, they build a positive model of self ("I deserve attention") and of others ("others are reliable"). This is natural secure attachment.
If responses were inconsistent, absent, rejecting, or frightening, different models form:
- Anxious: "I'm not sure I deserve love" + "Others might abandon me" = relational hypervigilance
- Avoidant: "I must only count on myself" + "Others are potentially disappointing" = emotional withdrawal
- Disorganized: "I need others AND they frighten me" = relational chaos
And what has been learned can be relearned.
Earned Secure Attachment: What the Research Says
It was Mary Main who first identified, in the 1990s, this category of adults she called "earned secure." Using the Adult Attachment Interview (AAI), a semi-structured interview that assesses adult attachment style, Main observed that some individuals presented paradoxical characteristics: their early relational history was clearly marked by adversity (neglect, rejection, loss, sometimes abuse), but their current relational functioning was secure.
What distinguished these individuals was not the absence of past suffering. It was the quality of their narrative. They could talk about their childhood in a coherent, integrated, and reflective manner. They didn't minimize ("it wasn't that bad"). They didn't drown in undigested emotion. They had a nuanced understanding of what happened, of why their parents acted as they did, and of the impact it had on them -- without that impact still controlling their lives.
Main called this quality narrative coherence. And according to her research, it is the best predictor of secure attachment in adults -- better than the quality of early experiences themselves.
In other words: it's not what happened to you that determines your adult attachment style. It's what you've done with what happened to you.
How CBT Therapy Restructures Attachment
CBT offers a particularly effective framework for working on internal working models, because it has precise tools for identifying and modifying deep beliefs and the behavioral schemas that follow from them.
Step 1: Identifying Insecure Relational Schemas
Jeffrey Young, in his schema therapy (an extension of classical CBT), identified several early maladaptive schemas that directly correspond to insecure attachment patterns:
For anxious attachment:- Abandonment schema: "People I love will eventually leave me."
- Dependence schema: "I can't manage on my own."
- Approval-seeking schema: "My worth depends on what others think of me."
- Emotional inhibition schema: "Showing emotions is dangerous."
- Excessive independence schema: "Relying on others means putting yourself at risk."
- Mistrust schema: "Others will hurt me if I lower my guard."
- Coexistence of contradictory schemas: intense need for connection AND terror of intimacy.
- Punitiveness schema: "I don't deserve to be treated well."
Step 2: Building Narrative Coherence
Narrative coherence is not a literary exercise. It is a therapeutic process that consists of reconstructing the story of one's relational history in an integrated way -- connecting events, emotions, thoughts, and behaviors into a whole that makes sense.
In CBT, this work involves several techniques:
The relational life line. We chronologically trace significant relationships from childhood to now. For each: what were the patterns? What beliefs formed? What behaviors became established? The goal is not to ruminate the past but to understand how current schemas were built -- in order to deconstruct them with full knowledge. Functional analysis of relational patterns. For each identified schema, we break down the sequence: triggering situation -> automatic thought -> emotion -> behavior -> consequence. This analysis reveals how the schema maintains itself through reinforcement loops. For example: "My partner doesn't respond to my message" (situation) -> "They're leaving me" (thought) -> anguish (emotion) -> sending 15 messages (behavior) -> the partner withdraws (consequence) -> confirmation of the abandonment schema. Restructuring core beliefs. Once beliefs are identified, we subject them to examination: "People I love always end up leaving me" -- is it really always? What are the exceptions? What is the evidence for and against? What alternative belief would be more realistic? Not "nobody will ever leave me" (which is equally unrealistic), but something like: "Some relationships end, and that hurts. But I also have the ability to build lasting relationships."Step 3: Graded Relational Exposure
CBT is fundamentally a therapy of action. Understanding your schemas is not enough -- you must confront them in concrete experience.
For someone with anxious attachment, exposure involves:
- Tolerating a response delay without sending a follow-up message
- Spending an evening alone without calling someone to "check on the relationship"
- Expressing a disagreement without fearing immediate abandonment
- Observing that the bond survives conflict
For someone with avoidant attachment, exposure involves:
- Sharing a vulnerability -- starting with something modest
- Asking for help with a concrete task
- Staying in the emotional conversation instead of changing the subject
- Tolerating physical and emotional closeness without withdrawing
Each exposure is followed by a debrief: what happened? Did the anticipated catastrophe occur? What does this experience say about the schema's validity? Gradually, new experiences create new neural connections that compete with the old ones. The schema doesn't disappear overnight -- it loses its power.
Step 4: Developing Mentalization
Peter Fonagy showed that mentalization capacity -- the ability to understand one's own mental states and those of others -- is a key factor in the shift from insecurity to attachment security.
In practice, mentalization is developed through simple but profound questions:
- "What am I feeling right now?" (identifying the emotion)
- "Where does this emotion come from?" (connecting to context and history)
- "What might the other person be feeling in this situation?" (perspective-taking)
- "Is my reaction proportionate to the current situation, or is it amplified by an old wound?" (differentiating past from present)
The Three Vectors of Change
Research on earned secure attachment identifies three main vectors through which change occurs:
1. Therapy
The therapeutic relationship is itself a corrective relational experience. A reliable, predictable, benevolent, and non-intrusive therapist offers exactly the type of relational experience the insecure person didn't have. Over sessions, this relationship creates a new internal model: "At least one reliable person exists. Relational closeness can be safe."
2. Significant Relationships
A secure partner. A long-standing friend. A benevolent mentor. Significant relationships with people who are themselves secure are natural laboratories for attachment remodeling. They offer repeated experiences of reliability, availability, and repair after conflict -- the three ingredients of relational security.
This is why partner choice is not trivial. An anxious person who systematically chooses avoidant partners (which is frequent -- pathological complementarity is powerful) deprives themselves of this vector of change. Awareness of this pattern is often a turning point in therapy.
3. Personal Reflective Work
Journals. Mindfulness meditation. Psychoeducational reading. These practices don't replace therapy, but they complement it by maintaining active attention on one's own functioning.
Reflective writing, in particular, is a powerful tool for developing narrative coherence. James Pennebaker, psychology researcher at the University of Texas, showed that expressive writing about emotionally difficult experiences produces measurable effects on mental and physical health, precisely because it structures the narrative and promotes integration.
Practical Exercises
The Relational Schema Journal
For two weeks, note every relational situation that triggered a strong emotional reaction:
| Situation | Automatic thought | Emotion | Intensity (0-10) | Behavior | Probable schema |
|-----------|-------------------|---------|-------------------|----------|-----------------|
| They didn't respond in 2h | They're pulling away | Anguish | 8 | 3 follow-ups | Abandonment |
| She gave me a compliment | She wants something | Suspicion | 6 | Dismissing it | Mistrust/abuse |
This table makes visible what is usually automatic and unconscious. It is the first step toward change.
The Unsent Letter
Write a letter to an attachment figure from your childhood (parent, grandparent, other). Not to send it -- to structure your narrative. Say what happened. Say what you felt. Say what you understand now that you didn't understand then. Say what you choose to keep and what you choose to leave behind.
This exercise can be emotionally intense. It is preferable to do it within the context of a therapeutic relationship.
The Planned Relational Experiment
Choose a relational behavior that is the opposite of your usual schema. If you are anxious: put your phone in a drawer for two hours and observe what happens -- in you and in the relationship. If you are avoidant: share an emotion you usually keep to yourself -- start with something small, with a trusted person.
Before the experiment: note your prediction (what you think will happen). After: note what actually happened. Compare. It is in this gap between catastrophic prediction and reality that the schema begins to crack.
The Timeline of Change
Let's be honest about one point: the shift from insecure to earned secure attachment is not a quick process. It is not a hack, not a 21-day method. It is deep work that is measured in months and years -- because it involves remodeling psychic structures that were built over decades.
But it is work that produces real and lasting results. Longitudinal studies show that earned secure attachment is as stable and functional as natural secure attachment. "Earned secure" individuals are not second-class secures -- they function equivalently in their relationships, their parenting, and their ability to manage stress.
There is even an argument that earned secure attachment confers a specific advantage: a depth of understanding of self and others that one does not acquire when everything went well. As one patient said at the end of therapy: "I didn't become someone else. I became someone who understands themselves."
What Changes When You Become Secure
The changes are not spectacular in the dramatic sense. They are profound in the structural sense. People who develop earned secure attachment report:
- Less emotional reactivity in ambiguous relational situations
- An ability to stay connected during conflicts, instead of fleeing or attacking
- A tolerance for relational uncertainty ("they didn't call back, and it's not the end of the world")
- A more stable sense of self-worth, less dependent on external validation
- Relationships that are more chosen and less endured -- entering relationships out of desire, not need
A Final Word
If you are reading this article and recognize yourself in an insecure attachment style, the most important thing I can tell you is this: your attachment style is not your identity. It is a learned mode of functioning, which served a protective function at a certain point in your life, and which can be transformed.
The path toward earned secure attachment is not linear. There are relapses, moments of doubt, situations where old schemas return in force. This is normal. Change is not measured by the absence of difficulties -- it is measured by the growing capacity to traverse these difficulties without losing your footing.
You don't need to erase your history to get better. You need to integrate it.
Going through this situation? Our assistant, trained on 14 psychotherapy models, supports you with 50 exchanges available -- in complete confidentiality.
💬
Analyze your conversations
Upload a WhatsApp, Messenger or SMS conversation and get a detailed psychological analysis of your relationship dynamics.
Analyze my conversation →📋
Take the free test!
68+ validated psychological tests with detailed PDF reports. Anonymous, immediate results.
Discover our tests →🧠
Vous reconnaissez ces schemas en vous ?
Un assistant IA specialise en theorie de l'attachement et des schemas — 50 echanges pour comprendre vos patterns.
Explorer en conversation — 1,90 €Disponible 24h/24 · Confidentiel
Related articles
Anxious or Avoidant Attachment: Understanding Your Relational Style
Do you tend to cling in your relationships, or do you flee as soon as intimacy deepens?
Disorganized Attachment: The Most Painful Attachment Style
Disorganized attachment blends intense need for connection with terror of intimacy. Traumatic origins and pathways to healing.
How to Move From Insecure to Secure Attachment
You can transform your insecure attachment style into secure attachment. Here's the complete CBT guide to achieve it, step by step.
What Is Your Attachment Style? Test and Guide
Why do some people experience love with serenity while others oscillate between fear of abandonment and the need to flee?