Secure By Design: Building a house that the big bad wolf can’t blow down.

Secure By Design: Building a house that the big bad wolf can’t blow down.

SUBSCRIBE! https://www.dhirubhai.net/newsletters/play-safe-7200032663670329345/

“Little pig, little pig, let me come in. Or I’ll huff, and I’ll puff, and I’ll blow your house down!”

The digital world is evolving rapidly, and so are cyber criminals. The traditional approach to cybersecurity, where computer security measures are added as an afterthought, are vastly inadequate in the face of increasingly sophisticated cyber threats.

The concept of "Secure by Design" advocates for security considerations to begin from the earliest stages of design and system development, and security is built into the core foundations rather than patched together as an afterthought as and when problems emerge.

Here are some key steps to follow, in order to be “Secure by Design”.

  1. Risk assessment: identify security requirements and potential threats. What are you trying to protect, and who are you trying to protect it from? “There is a big bad wolf living in the forest, who likes to eat little pigs!”
  2. Designing with security in mind: create a secure system architecture and follow coding best practices. Remember that an ounce of prevention is better than a pound of cure! “Building a house of bricks is more tiring, but the little pig did not mind hard work because he wanted a strong house.”
  3. Implement security controls: preventing unauthorised access. Make sure that only authorised users are allowed to enter. “Not by the hair on my chinny-chin-chin, I won’t let you in!”
  4. Inspection, testing, and ongoing maintenance: ensuring that the system holds up to threats and potential hackers. “No matter how hard the wolf huffed and puffed, he could not blow down the house of bricks.”

Over the next few editions, we’ll dive into each of these steps in greater detail. Stay tuned, and subscribe to Play Safe!

SUBSCRIBE! https://www.dhirubhai.net/newsletters/play-safe-7200032663670329345/

要查看或添加评论,请登录

Pei Ying CHUA的更多文章

社区洞察

其他会员也浏览了