Secure by Design

Cybersecurity banner

Cybersecurity is hard. Unsecure technology can lead to vulnerabilities that can threaten a network, data and users. Controls are put in place using a combination of hardware, software and training. Introduce the many IoT devices and artificial intelligence and there can be additional burdens in the fortification of the organization. A basic example or secure by design would be that an application will not allow a user to have a blank or weak password.

It is crucial that manufacturers design a product that is secure by default. No extra configuration should be required of the customer. The design process will build a product in a way to assist in preventing malicious cyber crooks from gaining access to devices, data and networks. Secure configurations are integrated into each layer of the development. Prioritization of features that protect customers is imperative. This concept will strengthen the security posture for the organization. Maintenance and patching costs will decrease.

The burden of security is on the customer AND the developer. Security by design will support compliance and regulations. It will enhance customer trust. Vulnerabilities in software can lead to costly breaches and reputational damages. Customers should choose vendors that adhere to the secure by design principles.

Key principles should include multiple layers of defenses to eliminate a single point of failure. Default settings should have access controls and designed to fail secure, denying access. Usability is key to the customer so an application should consider user needs and control access in order to reduce the attack surfaces. Installations should be minimal, with unused functionality disabled. Non-essential services should be disabled.

Secure by design takes a proactive rather than reactive approach. By implementing preventative measures at the onset the risks of cyber attacks is reduced.

Related:

ASD’s ACSC, CISA, and Partners Release Secure by Design Guidance on Choosing Secure and Verifiable Technologies

The Seven Principles of Privacy by Design