Secure by design

Last updated

The cyber security and systems engineering concept known as "secure by design" (SbD) mandates that security be incorporated into systems from the outset rather than as an afterthought. Instead of being retrofitted later through patching or external controls, it focuses on integrating security requirements into the architecture itself by incorporating protections at the very beginning of the design process for hardware, software, and services.

Contents

Assuming that systems will be attacked, Secure by Design entails limiting their architecture to make compromises challenging, contained, and recoverable. It highlights strategies like defence in depth, minimising attack surfaces, the least privilege principle, and integrating detection and response mechanisms. SbD treats security as a design constraint on par with performance, usability, and cost, in contrast to reactive approaches that mainly rely on vulnerability management after deployment.

Since significant cyber events, such as supply chain breaches and ransomware campaigns, have shown the shortcomings of reactive security, Secure by Design has gained popularity in the twenty-first century. SbD practices are now more frequently required by governments, businesses, and standards organisations in a variety of domains, from consumer Internet of Things (IoT) devices to defence systems. There are similarities between the idea and related paradigms like safety by design, privacy by design, and the larger trend towards resilient systems engineering.

Core Concepts

Secure by Design is based on a number of fundamental concepts:

These ideas complement and overlap with related paradigms like safety by design, privacy by design, and Zero Trust Architecture (ZTA).

Methodologies

Secure by Design is not a single method; it is a design philosophy that can be used in many different development lifecycles, such as Agile, Waterfall, and DevSecOps. Some well-known frameworks and methods are:

Government and Industry Adoption

Secure by Design has been required or suggested in a number of fields:

Criticism and Challenges

While widely endorsed, Secure by Design faces challenges in practice:

Despite these challenges, SbD is increasingly seen as essential in countering advanced persistent threats (APTs), ransomware, and supply chain attacks.

See also

References