The Laws (was the principles) of secure information systems design

Steve Kinney admin at pilobilus.net
Tue Jul 12 14:52:56 PDT 2016


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/12/2016 05:19 PM, Peter Fairbrother wrote:
> I've been revising the principles, and came up with this. It's an
> early version.

 [ ... ]

> The Laws of secure information systems design:
> 
> Law 0: It's all about who is in control Law 1: Someone else is
> after your data Law 2: If it isn't stored it can't be stolen Law 3:
> Only those you trust can betray you Law 4: Attack methods are many,
> varied, ever-changing and eternal Law 5: The entire system is
> subject to attack Law 6: A more complex system has more places to
> attack Law 7: Holes for good guys are holes for bad guys too Law 8:
> Kerckhoffs's Principle rulez! - usually... Law 9: A system which is
> hard to use will be abused or unused law 10: Design for future
> threats Law 11: Security is a Boolean Law 12: People offering the
> impossible are lying Law 13: Nothing ever really goes away Law 15:
> "Schneier's law c" [1] holds illimitable dominion over all... 
> including these laws


I call these "Network Security Axioms."  You will recognize most of
them, I am sure.  A couple are originals.


Everything is under control; your control or someone else's.

A trusted system is one that can break your security model.

A hardened perimeter is easily broken; a hardened system, not so much.

The laws of nations are easily broken; the laws of physics, not so much.

In God we trust, all others provide full source code for peer review.

Given enough observers, all bugs are shallow.

To make a system stronger, attack it.

Physical access can compromise any network security model.

A failed data backup may cost more than a successful break-in.

An unexamined assumption is a ticking time bomb.

User refusal is the principal barrier to secure networking.

Three years old, but holding up fairly well:
http://pilobilus.net/comsec-101.html


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBAgAGBQJXhWa4AAoJEECU6c5Xzmuqg/YIAIqudvOHmV2r1n2fNzZCtMnO
Hv9QhnwiWmer09SC6bZrDfX7U6hr/M2/nEn5d8aqrypZV4PYpZRYxW5ld3FEVU1Z
HCQAP+zTEZGxBuZIzHAcniUfDrH5lCvCt9PBMOkrfrV6xh5kqbLoTSpWFcOYunnI
5MUXTFX3MqjwbvG1m7ObKYXWMBLUxII+pHhPbKN9NgxiHXUaJVdvl1lMs/z+inUM
vUTyjj9EASqUcfGNykdFamEmIDyEh4+K2z2nlt7mneKzv+vXGpcEa2ZqroDl+1a/
ozFTivDR7vBJmsCdnlLcPbwNkGtSMzRiveV216q4zT9WidoZMQpMwodEBgVOY8c=
=1Rre
-----END PGP SIGNATURE-----



More information about the cypherpunks mailing list