Absence of Security in Initial Stages of System Engineering

Absence of Security in Initial Stages of System Engineering

Building a cyber secure system is one of the fundamental objectives of software developers and system engineers. Software developers focus on building feature-rich applications and improving user interaction and user experience. Security of applications and overall systems is left out to be tackled by third parties AFTER the system is developed.

The absence of security in the initial stages of System Engineering is the single most significant cybersecurity gap and risk in modern system development. ~Linda Rawson

Assurance Approach

Researchers have proposed different approaches to secure a system. Security by Design is an assurance approach; software and hardware developers try to secure systems by adopting practices like continuous testing, authentication safeguards, and adherence to best programming practices. This approach allows you to formalize infrastructure design and automate security controls so that you can secure every aspect of IT management and administration.

Security is an Organization Thing

Security in system engineering has a lot to do with WHO is involved more than vulnerabilities. The most important thing is to get the organization on board to embrace security. No exceptions. Implementing a DevSecOps approach ensures that security, development, and IT Ops teams work toward a joint security goal. If developers are onboarded with training that teaches them how to be hackers, they will write hacker-proof code.

Traditional Methods Need Adjusting

Security by Design helps secure the systems that were not networked initially, and security has not traditionally been considered in product design. One of the vital part goals of Security by Design is baking security into the design lifecycle, ensuring that data flows are secure, and authentication is appropriate.

Baking in Security

Baking in security is imperative as the entire IT landscape infrastructure has moved from just being client-server architecture to virtualization, cloud, a serverless environment, and containers, making it complicated for security practices. Cybersecurity should not be an afterthought; it should be baked in during the entire lifecycle of system development and deployment.

The variety of application development practices and frameworks should also be a motivation behind adopting cybersecurity. The conception, and partial reality, is cybersecurity is challenging and will slow the development cycle down. Modern software development lifecycle models have relaxed the perceived rigidity and are moving toward Agile methods.

The Waterfall model’s sequencing, emphasizing documentation at each phase before proceeding to the next phase, made it easier to include security controls at every step of the process. Baked in cybersecurity fit right into the rigid process.

Organizations are increasingly moving away from the waterfall model to rapid development cycles, where code is released monthly, weekly, daily, or even hourly.

The End Goal

Hardware and software should be treated together, integrated with cybersecurity early and frequently.

This blog was written by Linda Rawson, of DynaGrace Enterprises (dynagrace.com). For further information, please connect with Linda on LinkedIn, or contact her at (800) 676-0058 ext 101.

#cybersecurity #systemengineering #security #DevSecOps


要查看或添加评论,请登录

Linda Rawson的更多文章

  • Cyber-Resiliency in Organizations

    Cyber-Resiliency in Organizations

    A cyber-resilient mindset is different from a cybersecurity mindset, although they are complimentary. Cybersecurity has…

    1 条评论
  • Small Business Employer - COVID-19 Views

    Small Business Employer - COVID-19 Views

    If you are not familiar with me, I own DynaGrace Enterprises. I am a Women-Owned Small Business located in a rural Utah…

    9 条评论
  • My Current Reflections of COVID-19

    My Current Reflections of COVID-19

    I’m ashamed to admit, but at first, I was a non-believer about the chronic situation of COVID-19. In the first week of…

    15 条评论
  • CAREER REFLECTIONS: 35+ Years of Writing Code

    CAREER REFLECTIONS: 35+ Years of Writing Code

    I’ve been reflecting on my career lately. I have been so fortunate and have seen so much history.

  • What is an Industrial Hygienist?

    What is an Industrial Hygienist?

    Since the 1940s, Industrial Hygiene has been a profession. When my son came home and told me he was going to be an…

    20 条评论
  • Is Teleworking Right for You?

    Is Teleworking Right for You?

    Everyone imagines themselves working from home in their pajamas and not having to endure the hassle of showing, getting…

  • Fear: Tips to Get Through Fear

    Fear: Tips to Get Through Fear

    This week at the Morgan County Women in Business we discussed fear. When we went around the room, everyone had a…

    1 条评论
  • Dr. Alice Hamilton: Industrial Hygiene Crusader

    Dr. Alice Hamilton: Industrial Hygiene Crusader

    For National Women Physician’s day, I chose to commemorate the success of Dr. Alice Hamilton.

  • From Home Office to Physical Office

    From Home Office to Physical Office

    What is it like to open a physical office? Our open house was last week. It was surreal.

    4 条评论
  • Do you know your life purpose?

    Do you know your life purpose?

    I am just beginning to understand mine. I have always been helpful and compassionate, but I truly love helping people.

    1 条评论

社区洞察

其他会员也浏览了