The Register: What does it mean to build in security from the ground up?

Source URL: https://www.theregister.com/2025/02/02/security_design_choices/
Source: The Register
Title: What does it mean to build in security from the ground up?

Feedly Summary: As if secure design is the only bullet point in a list of software engineering best practices
Systems Approach As my Systems Approach co-author Bruce Davie and I think through what it means to apply the systems lens to security, I find that I keep asking myself what it is, exactly, that’s unique about security as a system requirement?…

AI Summary and Description: Yes

**Summary:**
The text delves into the historical context and evolving narrative of internet security, emphasizing the need to rethink security architecture from the ground up. It highlights the significance of modular security mechanisms, the importance of educating the public on security risks, and the inherent challenges in implementing effective security in multi-tenant systems. This piece provides strong insights for security and compliance professionals, particularly in the realms of software security and multi-tenant system design.

**Detailed Description:**
The text presents an introspective examination of security in the internet era through personal experiences. Key themes and points include:

– **Historical Perspective on Security:**
– There was a time when internet security was not mainstream; significant breaches, like the Morris Worm, raised awareness.
– Education efforts began largely within the research community to inform the general public about security threats.

– **Public Awareness and Education:**
– The author recalls public engagements aimed at promoting security literacy, including media appearances and university retreats.
– Efforts were partly motivated by the need to secure more funding and attention for research and enhancements in internet security.

– **The Unique Nature of Security as a System Requirement:**
– Security serves as a strong motivator and is well understood by the general public, yet the goal of building security “from the ground up” is complex.
– The author questions the practicality of this approach, noting that existing modular security mechanisms (like Kerberos and TLS) should be leveraged rather than reinvented.

– **Design Considerations for Multi-Tenant Systems:**
– When developing multi-tenant systems, isolation between users is essential and should be implemented from day one using existing security mechanisms.
– Early designs prioritized fair resource allocation over malicious attack scenarios, suggesting that security considerations are now more intricate and sophisticated.

– **The Role of Best Practices in Software Security:**
– Emphasizes the existence of established security development practices, such as Microsoft’s Security Development Lifecycle (SDL), which many organizations likely adopt.
– Reiterates the need for developers to follow these stringent engineering requirements to maintain security.

– **Incentives and Challenges of Security:**
– Security is defined by a series of negative goals – primarily avoiding failures caused by attacks.
– The author expresses a personal sentiment about the dissatisfaction of working primarily to prevent negative outcomes, yet acknowledges the motivational power this inherently possesses.

**Implications for Professionals:**
– Understanding and leveraging existing security frameworks is crucial for modern software development.
– Educators and developers must emphasize the importance of security awareness and best practices to avoid vulnerabilities.
– Professionals in compliance and governance should focus on the evolving landscape of security mechanisms while ensuring adherence to best practices.

This examination of security encapsulates essential historical context and practical advice for navigating modern security challenges, especially in the spheres of software development and cloud computing, where multi-tenancy becomes a vital consideration.