01.03.2024 Views

The Cyber Defense eMagazine March Edition for 2024

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A changing regulatory landscape<br />

<strong>The</strong> US took the lead and introduced the National <strong>Cyber</strong> Security Strategy in <strong>March</strong> 2023 which<br />

committed to developing legislation to make software developers liable <strong>for</strong> security. This was followed by<br />

the QUAD nations (Australia, India, Japan and the United States) releasing the “Joint Principles <strong>for</strong><br />

Secure Software” which included an agreement to require security-by-design within government software<br />

procurement rules.<br />

Later in the year, the White House published its Implementation Plan <strong>for</strong> the National <strong>Cyber</strong> Security<br />

Strategy which put in place a public-private partnership to drive the development and adoption of software<br />

that is secure-by-design and default. CISA also published recommendations on how software<br />

manufacturers can implement secure design.<br />

This raft of regulation and guidance in 2023 clearly set out the direction of travel <strong>for</strong> governments and<br />

legislators; the future is security built right into the design of systems themselves, rather than added after<br />

the fact.<br />

So, what is security-by-design and how can organizations begin to put it into practice?<br />

Secure Design and Threat Modeling<br />

To create software that is secure-by-design, we need to identify threats to the security of the data and<br />

assets, and assess and mitigate the risks be<strong>for</strong>e we begin building the software.<br />

No software manufacturer sets out to build software that is insecure. But the reality is that developers are<br />

incentivized to get software to market as quickly as possible and worry about security later. However,<br />

trying to fix flaws after software has been built is both time consuming and expensive. So we need to<br />

tackle this issue from the very beginning be<strong>for</strong>e a single line of code is written. Threat modeling is how<br />

we do this.<br />

Threat modeling is the process of analyzing software <strong>for</strong> potential threats and determining the most<br />

effective ways to mitigate them and is fundamental to secure design. Originally developed by Microsoft<br />

in 2005, the threat modeling process can easily be understood using Adam Shostack’s four question<br />

framework designed to help teams build more secure systems:<br />

1. What are we working on?<br />

2. What can go wrong?<br />

3. What are we going to do about it?<br />

4. Did we do a good enough job?<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2024</strong> <strong>Edition</strong> 37<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!