What is the principle of Least Privilege according to NIST?
Least privilege is the principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations that the entity needs to perform its function.
What is the ‘Need to Know’ principle?
‘Need to Know’ is a critical component of modern Zero Trust initiatives and must be strictly enforced regardless of the access control model being used.
What is Defense in Depth (DiD)?
DiD is a ‘Layered Defense’ approach that utilizes the principles of least privilege and is a function of ‘due care’.
How can Defense in Depth be applied?
It can be applied to physical security or technical controls, and should be systematically planned and designed.
What is a characteristic of physical security in DiD?
In physical security, it should be systematically planned and designed with an outward-in or inward-out approach.
What does DiD encompass in terms of technical controls?
It can involve a single appliance with multiple integrated engines.
What role does DiD play in supply chain risk management?
DiD is a common element of supply chain risk management (SCRM).
What is the principle of Secure Defaults?
This principle states that the default configurations of a system are a restrictive and conservative enforcement of the written security policy.
What does Secure Defaults apply to?
It applies to the initial configurations of a system, including the securing engineering and design of access controls.
What strategy does Secure Defaults use?
It uses a ‘deny unless explicitly authorized’ strategy.
What should ‘as shipped’ configurations not contribute to?
‘As shipped’ configurations of a system should not contribute to security policy violations.
What does Secure Defaults aim to avert?
It aims to avert situations where systems operating in the default state require configuration by operational users.
What is critical for enabling security defaults?
Automation and Infrastructure as Code (IaC) are critical enablers for security defaults.
What does the Fail Securely principle state?
It contends that when a system or server fails, it should have the minimum impact possible on the system’s security or functionality.
How do fail-secure systems react to failure?
Fail-secure systems react by denying access or data-in-transit in case of a failure.
What is an example of a fail-secure system?
A fail-secure door lock will stay locked in an access control system if power is lost or an internal battery dies.
Example of fail-secure system.
What is a critical requirement of secure coding?
Handling error security is a critical requirement of secure coding.
What should security mechanisms allow according to OWASP?
Security mechanisms should be designed so that failure allows the same execution path as disallowing the operation.
What should methods like isAuthorize() return on exception?
Methods such as isAuthorize(), isAuthenticated(), and validate() should all return false if there is an exception when processing.
What is the principle of Segregation of Duties?
It is a principle where more than one subject is needed to complete a particular task.
What does Segregation of Duties involve?
It may involve dual operator principles, where two or more subjects are needed to modify or approve.
What is an example of dual operator principles?
For certain actions, two signatures or two different key pairs are required, such as for digital signatures.
Example of dual operator principles.
What is the related principle to Segregation of Duties?
Rotation of duties is a related principle.