Security by design is one of those concepts that happily goes hand in hand with resilience. Candidly, they were made for each other. The security by design methodology helps minimize some of the inherent risk we cannot do anything about.

Building on a tectonic plate

Consider for a moment you absolutely had to construct something — say, a building — on a foundation that is inherently vulnerable. There are no other areas to build on (at least not yet). How would you go about that?

Chances are you would take a more cautious approach, build incrementally and test along the way. You would likely add in some redundancies, just to be safe, correct? You would also think about the entire life cycle of the building. You’d try to determine how many good years you could get out of it knowing it is on shaky ground. You’d want to know what type of maintenance would be required.

Quite reasonably, you would examine your technical processes to make sure you have good project management in place, a risk matrix and decision-making process and a way to keep track of quality all before you started to build. And knowing that you are building on something inherently vulnerable, you would also have a plan for how to bring down the building safely and dispose of all materials just in case it becomes too risky to keep up.

Finally, you wouldn’t want people to enter that building unless a bunch of safety checks were performed.

Seems like a quite reasonable approach.

So why are we developing our software and infrastructure in the exact opposite way?

The inherent vulnerability of the internet

The backbone of what we rely on — the internet — is inherently vulnerable.  Accept that and you are ahead of most, especially as there is little we can do about it right now. If you are asking why, it’s because of decisions made decades ago. At the same time, we’re stuck with what we have because of the lack of capital resources to build a ‘new internet’. Because ‘it is what it is,’ there is pressure on business continuity and disaster recovery planners. Therefore, if you are feeling that it is one cybersecurity crisis after another, just remember this: the people who built the internet made it to share information, not necessarily be secure. Security just wasn’t top of mind.

Welcome to 2021. Information security is so top of mind for everybody, the issue is ready to pop out of our heads!

Here’s the key: the internet is your unstable tectonic plate. And just like we have learned to design and construct buildings to be stronger and more resilient in earthquake zones, we need to do something similar for our information technology infrastructure and software. That is where security by design comes in. It is the mitigating methodology to reduce risk.

A multidisciplinary approach to design for systems security

If you are looking for a one-stop-shop on security by design principles, there is no better place than NIST SP 800-160 Volume 1, Systems Security Engineering, Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. Building on standards from the International Organization for Standardization (ISO), the International Electrotechnical Commission (IEC) and the Institute of Electrical and Electronics Engineers (IEEE), NIST SP 800-160 mixes in systems security engineering techniques, methods and practices to improve the robustness, security and resilience of systems and software.

It is difficult to summarize any better the purpose of the special publication from what is already in there, so let’s just cite directly from it:

The ultimate objective is to address security issues from stakeholder requirements and protection needs perspective and to use established engineering processes to ensure that such requirements and needs are addressed with the appropriate fidelity and rigor across the entire life cycle of the system.

And the keyword is ‘system’ because that is what ties it all to resilience.

Think about it like this. A single business process becoming unavailable or an asset failing, in isolation, does not impact anything else. Sure, that individual item may buckle, but you contain the blast zone. It’s an isolated resilience failure.

But if those processes or assets have upstream and downstream dependencies, well, then the calculus changes. Knock off one or more of those critical ones and your entire system can come crashing down. That’s why security by design is such an incredible methodology: it’s fixing every piece (a smaller system) in isolation before it gets plugged into the larger system. In other words, if it is safe in isolation, the likelihood of it being unsafe in the larger system decreases. Translation: a more resilient system.

The price of a secure system

There are two harsh truths that come with security by design. It’s potentially costly and may come in opposition to business needs. Candidly, good code isn’t cheap. And business drivers, along with market demands and behaviors, do not necessarily have the time or patience to wait for good code.

And therein is your resilience paradox. Security sustains and helps build a strong economy. But, you need a strong economy to invest in security.

See the conundrum? Limited resources and time bind us, leaving us to invoke the old favorite: it’s all about risk management. At some point, somebody has to make the decision and say, “All right, I know I’m going to suffer a disruption, and I know that I need to find a way to operate through that disruption; how much risk can I take on and survive?”

Really, that is all that it comes down to. With 5G investments happening, Internet of Things use still exploding and sensitive data handling requirements continuing to grow, such as personal health information, we are reaching a tipping point where the risk may be too high. Specifically, we are reaching that level where an organization may not be able to operate through a disruption. Instead, it may go bust.

That’s why security by design is such a good idea. It may cost upfront, and it may take a bit longer to implement, but the approach will help you weather most storms.

Next in our journey and very appropriate after this piece: the supply chain and third parties.

More from Risk Management

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

How cyberattacks on grocery stores could threaten food security

4 min read - Grocery store shoppers at many chains recently ran into an unwelcome surprise: empty shelves and delayed prescriptions. In early November, Ahold Delhaize USA was the victim of a cyberattack that significantly disrupted operations at more than 2,000 stores, including Hannaford, Food Lion and Stop and Shop. Specific details of the nature of the attack have not yet been publicly released.Because the attack affected many digital systems, some stores were not able to accept credit/debit cards, while others had to shut…

Taking the fight to the enemy: Cyber persistence strategy gains momentum

4 min read - The nature of cyber warfare has evolved rapidly over the last decade, forcing the world’s governments and industries to reimagine their cybersecurity strategies. While deterrence and reactive defenses once dominated the conversation, the emergence of cyber persistence — actively hunting down threats before they materialize — has become the new frontier. This shift, spearheaded by the United States and rapidly adopted by its allies, highlights the realization that defense alone is no longer enough to secure cyberspace.The momentum behind this…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today