“Secure By Design and Default” in Your Cybersecurity Team
David Matousek
Engineering and Product Leader | Aligning Technology and Security outcomes to business objectives | Defining emerging tech frameworks to create value
What the Three “Secure by Design and Default” Software Product Security Principles Mean for Your Cybersecurity Team
Bad security happens because we protect only one attack surface at a time or when a new regulation tells us to. We are “Vulnerable by Design.” (CISA ).There is no way we can continue keeping products and even ourselves secure if we rely on humans to take action to keep their security posture current. “Secure by Design and Default” wants to change how we design products from the beginning of the process by injecting security from day one.
“Secure by Design and Default” is an approach to security product development where customer-centric security requirements are injected into product development from the beginning and products are released in a state where customers are secure “out-of-the-box.”
Many of us in the DevSecOps world already strive to do this with our own projects. In reality, our software supply chain relies on many open-source and third-party vendors to keep us afloat. Many of these software and hardware products require us to keep them current with security patches. I don’t know about you; product currency stories in our backlog usually don’t get the highest priority. Balancing priorities among customer features, security, and engineering operations means that security doesn’t always “eat first.”
“Secure by Design and Default” extends security into the product world. The intention of the “Secure by Design and Default” is to bring a set of principles and tactics to manufacturers and encourage them to “take ownership of improving the security outcomes of their customers”(CISA )
Now, I recognize that the intent of the “Secure by Design and Default” mission is to provide high-level principles and recommendations for technology manufacturers. However, I believe these very same principles and recommendations apply to our internal cybersecurity teams as well.
What “Secure By Design” Means for Your Cybersecurity Team
Cybersecurity teams have been created in a variety of ways. Sometimes they started out with a purpose from an Information Security team, other times, they were just a few security architects over in the corner rarely listened to.
“Secure By Design” infers that the makeup of your security team, processes, and tools should be defined by a set of preexisting set of standards and controls. Not all security teams start out this way.
The first step to being “Secure by Design” is to build a framework of rules to communicate effectively to your business/organization. Development and operation teams need to know exactly what security policies are in place, what processes they need to follow to be compliant, and what resources are available for them to use.
A more evolved method of “Security By Design” is to make the implementation of security frictionless. Once you have your policies and standards in place, there is an opportunity to automate your security policies. Ideally, security would have no additional actions that a user needs to make in order to be compliant with the security policy. Frictionless security doesn’t happen overnight, but prioritizing the processes that are used the most and reducing the most risk is where to start.
What “Secure by Default” Means for Your Cybersecurity Team
Building resiliency in cybersecurity teams has a lot of meanings. I like to think that each experience a customer, partner, or stakeholder has with cybersecurity needs to be “Secure by Default.” Having a focus on reducing or removing actions a user needs to do to be secure provides a better user experience. And with all things in life, a better experience leads to proper usage, higher adoption, and in turn, better security by default.
领英推荐
Truthfully, the multitude of use cases that need to be evaluated and improved is an organizational challenge. There’s only so much time in the day, and there’s one thing I’ve noticed about the security team, they have a process for everything. Improving the user experience of security will not be an easy feat, but over time as new processes roll out, it’s imperative that the user experience be a consideration.
What the Three “Secure by Design and Default” Software Product Security Principles Mean for Your Cybersecurity Team
1. The burden of security should not fall solely on the customer
There are three components to this principle. Focus on Customer Experience — Don’t let security be an impediment to using your products or services. The best security is one that doesn’t change the user experience for your customers. Users have an expectation of how much effort they are willing to put into using a new product or service. Unlike the IRS, most organizations cannot make logging in a multi-step ordeal. Security needs to be both present and invisible — If there is a process we can do behind the screens to make the customer’s experience seamless and easier, security should prioritize these tasks. Don’t let customer experience end up buried in the backlog to be purged. Take ownership of all your Customers — Don’t forget to include both internal and external customers of Cybersecurity. Internal customers of security include the employees of your organization. People are our biggest threat. By making security an impediment to their goals, we can unintentionally incentivize our own people to skip security processes.
2. Embrace radical transparency and accountability
Stakeholders tell cybersecurity that they what to know what they are getting for the money they are putting in. Don’t confuse this with the phrase, “What do you do here?” Two questions I see Stakeholders asking time and time again are: “What value are you delivering to the business?” — Stakeholders are not necessarily security experts. They do not necessarily understand that fixing a vulnerability improves the overall security posture and reduces the risk for the entire company. They do understand that if the risk is reduced, then the chance of an exploit could be reduced and/or the potential consequences limited. I like to communicate with my stakeholders in terms of their own goals. When a stakeholder gives me access to the objectives of their product and how they measure them, I gain valuable insight into what matters to them. This allows me to organize our security initiatives under their outcomes. By showing that security initiatives can influence their key results, I effectively show the business the value security provides in measurements that they understand and use. “Are you effectively delivering value?” — In addition to “delivering value to the business, it’s important to measure how efficient your work is as well. Knowing this information gives stakeholders confidence that security is delivering value creating a culture of improvement through using data to make decisions.
3. Build organizational structure and leadership to achieve these goals.
Organizations don’t change hierarchies frequently. I have found that it’s not even necessary. Shifting to a product-led security approach can begin as a small shift that grows over time. Product Mindset — The first shift toward implementing a product-led security organization is adopting a product mindset. Adopting a product mindset means we are primarily concerned with continuously delivering incremental value to the organization over time. The most common way to deliver measurable value is by a form of goal setting known as ‘Outcome & Key Results. Having a product mindset means that you deliver measurable expected outcomes rather than completing projects that may or may not accomplish what you set out to do. Align Security vision and strategy to the business — Most organizations have a vision statement that defines what the organization aspires to do. This vision leads to the yearly and quarterly goals. These goals, also known as outcomes, are how the business creates value. It’s up to security to align their goals were possible to the business outcome. These security outcomes become the strategic roadmap of how cybersecurity provides measurable value to the organization. I go into a deeper dive on this subject in “3 Tips for Aligning Business Vision to Cybersecurity Strategy .” Inject Security into the Product Trio — I am not advocating for changing product trios . I am advocating for having product managers inject security requirements into their products from inception. Cybersecurity needs to provide business product managers with a security framework so that they can incorporate security easily.
Final Thoughts
“Secure by Design, Secure by Default” really resonated with me at multiple levels. The approach of shifting the burden of security from the customer to the product itself provided a key lesson to deliver a better and longer-lasting experience for our customers.
As we build product-led principles into our own internal cyber teams, there is much to appreciate in focusing on our customer’s experience, increasing transparency, and aligning our security outcomes to business value.
To learn more about delivering cybersecurity value to customers, developers, and business stakeholders, check out my other articles on LinkedIn.
If you made it this far, please consider any combination of liking, commenting, or following me on LinkedIn.
Reduce risk - focus on vulnerabilities that matter - Contextual ASPM - CEO & Founder - Phoenix security - ??♂? Runner - ?? Application Security Cloud Security | 40 under 40 | CSA UK Board | CSCP Podcast Host
7 个月Great point and distinction ?? Chris Romeo cover this in the appsec unbounded conference https://www.youtube.com/live/s7Fzvcl5ACA?si=WxAlPBqJxRP9GB8y
Cybersecurity Extraordinaire | Award-Winning Author & Speaker | Educator & Industry Leader | CISSP, CSSLP, AWS
7 个月Awesome write up David! Why do you think that we are still pushing for secure by design and why this isn't just second nature yet? There are many organizations making this a priority, and getting it done. But there are still plenty that aren't.