Common Security Architecture Principles

Common #Security #Architecture #Principles

The principles concept in security architecture is the most enduring and the principles are generally do not change much with the flow of time.

There are common principles I encountered in many organisations that make common sense.

Not all principles that I provide here are adopted with the same rigor and diligence. In many cases their adoption depends on the organisation size, business it is in, type of data, regulations, and many other criteria.’

Let’s have a look at some of them and what they mean

1.??????Least Privilege – or in military terminology – “Need to know”.

In this the people in your organisation have just enough access to do their jobs. This leads to many security controls, some of them in Identity and Access management space, for example regular User Access Reviews with removal of unneeded access. Another example would be firewall rule policies that should be as explicit as possible.

2.??????Defence in depth

This principle assumes that some of your systems have been compromised and it leads to layered approach with additional controls on the next layer of defence, should your first one be breached. For example, you have perimeter firewall with explicit rules, then you have intrusion detection system on the firewall and on the network past it, then you have endpoint detection systems, etc.

3.??????Segregation of duties

This is not just security principle, but more general enterprise governing principle. An example of that would be one person preparing money transfer to pay for an invoice and another person authorising actual transfer. Another example would be dual control, where certain action requires approval by 2 people.

4.??????Fail safely

This means that if the system fails in some way, none of its security controls are compromised. Good example from physical security would be that doors remain locked in case of power failure. In the firewall example, it is better to stop all traffic in case it fails, instead of allowing all.

5.??????Principle of Open Design

It means you do not rely on the secrecy of your control implementation. Good example is modern cryptography algorithms, most common ones are well known by all who is interested, and the strength of encryption is provided by the keys/certificates/passwords that are secret.

6.??????Minimise attack surface

This principle is a bit like Least Privilege. It leads to keeping your systems as simple as possible and implementing only absolute minimum of services required. For example, when hardening an operating system, disabling any service/application that is not needed by the applications that will run on it.

What are not security principles?

I have a couple of good examples.

So widely used buzz words “Zero trust” is not a principle, it is more of a strategy or framework. Converting it to principles, one of them would be something like: Treat your local network the same as it is external internet. There will be others as well for zero trust, but it is a topic for another article.

Secure by design is not a principle, more of a strategy and approach as well.

Any other security principles you found useful? Please comment, I want to make it article a reference material and promise to process all your feedback and input.

要查看或添加评论,请登录

Ilya Polyakov的更多文章

  • Identity Governance and Administration with Multi-cloud

    Identity Governance and Administration with Multi-cloud

    Introduction As organizations increasingly adopt cloud technologies, managing user identities and access permissions…

    5 条评论
  • Demystifying Security Architecture

    Demystifying Security Architecture

    Security architecture is a term that often leads to confusion because it means different things to different people…

    5 条评论
  • The Most Hated Security Control in Essential 8

    The Most Hated Security Control in Essential 8

    The Essential 8, developed by the Australian Cyber Security Centre (ACSC), outlines eight crucial strategies to…

    6 条评论
  • What is ISM? = Information security manual.

    What is ISM? = Information security manual.

    Sometimes, people who suddenly were thrown into security domain, ask: "I joined an organisation and they have…

    1 条评论
  • STRIDE in security threat assessment

    STRIDE in security threat assessment

    #STRIDE is a model for to help with security threat modelling developed at Microsoft. It stands for: #Spoofing…

    1 条评论
  • Why Mitre has several moving parts and what are they used for?

    Why Mitre has several moving parts and what are they used for?

    There are many posts about Mitre that flooded LinkedIn, some of them are quite good. What I did not notice in any of…

    3 条评论
  • All of IT by Mr IP

    All of IT by Mr IP

    Many people are asking me many questions about IT, security, strategy, career advice, guidance, etc. So I decided to…

    1 条评论

社区洞察

其他会员也浏览了