Discussion 1
docx
keyboard_arrow_up
School
University of the Cumberlands *
*We aren’t endorsed by this school
Course
535
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
1
Uploaded by DoctorFly2464
The security design principles are meant to build an ongoing security mindset to help organizations
improve the security posture of their workload as the techniques of threat actors continuously evolve.
These principles influence the security of their architecture, design choices, and operational processes. If
these principles aren't applied properly, a negative impact on business operations and revenue can be
expected. Some implications could result in regulatory workload fines as well as continuous security
issues before they are recognized. There are various fundamental security design principles that are in
practice which enables the system to achieve its objectives. The least privilege and fail-safe defaults are
two of these essential security design principles (Leavitt, 2023).
The principle of least privilege (POLP) gives users limited access rights based on the tasks necessary to
fulfill their job. It is a key component of Zero Trust, which is a security framework requiring all users to
be authenticated, authorized and continuously validated for security configuration and posture before
being granted access to applications and data. POLP ensures that only authorized users whose identities
have been validated are granted access to certain systems, applications, data, and other assets.
Organizations can limit user access to their network, systems, and resources by applying the principle of
least privilege. The employees are given access on a strictly need-to-know basis. This prevents threat
actors from entering the organization's network and gaining unlimited access to the confidential data,
hence boosting data security (Vaideeswaran, 2023). The fail-safe defaults principle works by providing resources to users only after they have been granted
permission. This ensures that no unauthorized individual has access to the information unless granted
permission. In contrast to least privilege, where specified users are granted access to data and resources
for a limited time or until the tasks are completed. If the user fails to complete the task, the changes are
undone and the system is returned to a stable and consistent state. An example of its implementation is
the rollback of database transactions that fail. These security design principles ensure that the
organization operates in a safe and secure manner without jeopardizing the system's integrity and
confidentiality. These principles also help in keeping the information and resources in their original and
true form when accessed (Mlakar, 2019). References
-
Leavitt, S. (2023). Security design principles. https://learn.microsoft.com/en-us/azure/well-
architected/security/principles
-
Vaideeswaran, N. (2023). What is the Principle of Least Privilege (POLP)? https://www.crowdstrike.com/cybersecurity-101/principle-of-least-privilege-polp/
-
Mlakar, J. (2019). InfoSec Design Principles – 8 Security Principles to Implement. https://www.mlakartechtalk.com/infosec-design-principles-8-security-principles-to-implement/
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help