Lessons From The Past: 10 Immutable Laws Of Security (Version 2.0)
22 February 2020 2023-07-15 15:36Lessons From The Past: 10 Immutable Laws Of Security (Version 2.0)
We looked at the 10 Immutable Laws of Security before. Then Microsoft security researcher Scott Culp posted a list of principles to keep in mind when considering computer security. Whether you are a novice user or an advanced user, it is sound advice to continue to use. In 2011 Microsoft decided to update the laws. As technology and the threat landscape keep evolving, so must our thinking and mental models. Below is the updated list. The differences with the old laws are bolded.
10 Immutable Laws Of Security (Version 2.0)
- If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore.
- If a bad guy can alter the operating system on your computer, it’s not your computer anymore.
- If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore.
- If you allow a bad guy to run active content in your website, it’s not your website any more.
- Weak passwords trump strong security.
- A computer is only as secure as the administrator is trustworthy.
- Encrypted data is only as secure as the decryption key.
- An out-of-date antimalware scanner is only marginally better than no virus scanner at all.
- Absolute anonymity isn’t practically achievable, online or offline.
- Technology is not a panacea.
The old list of laws can be found here: https://www.modernsamurai.info/laws-of-security/