{"id":101978,"date":"2019-09-16T09:00:30","date_gmt":"2019-09-16T16:00:30","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=101978"},"modified":"2020-04-21T14:18:06","modified_gmt":"2020-04-21T21:18:06","slug":"cyber-canon-engineering-trustworthy-systems","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2019\/09\/cyber-canon-engineering-trustworthy-systems\/","title":{"rendered":"Cyber Canon Book Review: Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time"},"content":{"rendered":"<p><strong>Cyber Canon Book Review:\u00a0<span style=\"font-weight: 400;\">\u201cEngineering Trustworthy Systems: Get Cybersecurity Design Right the First Time,\u201d 2018, by O. Sami Saydjari<\/span><\/strong><\/p>\n<p><strong>Book Reviewed by:\u00a0<span style=\"font-weight: 400;\">Ben Rothke<\/span><\/strong><\/p>\n<p><strong>Bottom Line:\u00a0<i><span style=\"font-weight: 400;\">I recommend this book for the Cybersecurity Canon Hall of Fame.<\/span><\/i><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\"><strong>Review:<\/strong>\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Imagine a 100-story building designed with a few clicks and plug-ins, with no oversight, no safety review, being built in an unregulated industrial zone. Imagine both the designers and builders, who likewise really didn\u2019t have any significant expertise in their respective fields. Most people would never step into the building due to safety concerns. Companies would never entertain the ludicrous notion of moving their employees into such a building.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yet when it comes to IT systems, many of which are mission critical and operating in a crucial infrastructure, they are similarly built without any information security or privacy review. The ease of use of which insecure systems, networks and applications can be built, often under the radar of IT, is a cause for concern.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In \u201c<a href=\"https:\/\/www.amazon.com\/Engineering-Trustworthy-Systems-Cybersecurity-Design\/dp\/1260118177\/ref=sr_1_1?crid=3O77T71UIGQ4R&amp;keywords=engineering+trustworthy+systems&amp;qid=1568337583&amp;sprefix=engineering+trust%2Caps%2C187&amp;sr=8-1\" rel=\"nofollow,noopener\" >Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time<\/a>,\u201d author O. Sami Saydjari has written a fantastic guide on how to design highly secure systems that can ensure the effective security and privacy of personal information.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">New Yorkers know the radio station 1010 WINS tagline: \u201cYou give us 22 minutes, we'll give you the world.\u201d It\u2019s no exaggeration to claim that one could create a significantly sized, cloud-based IT infrastructure in AWS in 22 minutes. It\u2019s also no exaggeration to claim that such an infrastructure would be seriously lacking in security and privacy controls. That is where \"<\/span><span style=\"font-weight: 400;\">Engineering Trustworthy Systems\"<\/span><span style=\"font-weight: 400;\"> comes into play as a fantastic guide on how to design highly secure systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first guide to really detail how to do that was Ross Anderson\u2019s classic reference, \u201c<\/span><a href=\"https:\/\/www.amazon.com\/gp\/product\/0470068523\/ref=as_li_tl?ie=UTF8&amp;tag=benrothkswebp-20&amp;camp=1789&amp;creative=9325&amp;linkCode=as2&amp;creativeASIN=0470068523&amp;linkId=5f551b7da296bed311d7dcefcdc32cd2\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Security Engineering: A Guide to Building Dependable Distributed Systems<\/span><\/a><span style=\"font-weight: 400;\">.\u201d Written in 2001 and updated in 2008, the world of information security has since changed and transformed radically. \u201cEngineering Trustworthy Systems<\/span><i><span style=\"font-weight: 400;\">\u201d<\/span><\/i><span style=\"font-weight: 400;\"> fills in a lot of those gaps. Somewhat surprisingly, Saydjari doesn\u2019t reference Anderson\u2019s book.\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">\u201c<\/span><\/i><span style=\"font-weight: 400;\">Engineering Trustworthy Systems<\/span><i><span style=\"font-weight: 400;\">\u201d<\/span><\/i><span style=\"font-weight: 400;\"> is quite valuable for a wide range of readers: from those looking to get a detailed understanding of information security to those looking to use it as a college text for a multi-semester course.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An interesting observation Saydjari makes at the beginning is that those designing secure systems must approach cybersecurity design as an immune system, not as a single white blood cell. Too many security administrators think a border firewall and a DMZ are enough to secure their infrastructure. Anyone using such an approach will be sorely disappointed. Breaches are likely in a matter of hours.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Saydjari packs a huge amount of material into this nearly 500-page work. The 25 chapters are written in a procedural manner. They walk the reader through the core areas of information security and cover all of the fundamentals. He also makes able use of charts and diagrams to provide a detailed understanding of the topic at hand.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The message the book conveys is that information security requires a rigorous and disciplined approach via formal engineering methods. Getting that large IT infrastructure up and running in AWS is the easy part. Ensuring it is engineered securely, and stays secure, is an entirely different matter. The book takes this orderly, holistic approach to the topic, and guides the reader through the various layers of information security that need to be built into systems.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What one gets from reading this book is the breadth of details that encompass a secure system. For too many people, it\u2019s about firewalls, Active Directory GPO or AWS security policies. Since attackers take a very broad approach, those creating a defensible network must take a similarly broad approach. Saydjari details the importance of not just security in depth but also security in breadth.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The book emphasizes that the trustworthiness of a system is so essential that it must be designed into systems from the very beginning. Lack of such an approach is what has led to many systematic security failures and huge data breaches.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another theme of the book is risk quantification. An effective CISO must possess data and communication skills to explain risks to the board. The best guide to do that is \u201c<\/span><a href=\"https:\/\/www.rsaconference.com\/blogs\/measuring-and-managing-information-risk-a-fair-approach\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Measuring and Managing Information Risk: A FAIR Approach<\/span><\/a><span style=\"font-weight: 400;\">\u201d by Dr. Jack Freund and Jack Jones. While Saydjari doesn\u2019t quote from the book, he does provide methods on how one can communicate those ideas to senior management, a surefire technique for a corporate board to gain confidence in the information security team.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For those looking to understand both the importance of designing information security into systems, and a detailed method by which to do that, \u201cEngineering Trustworthy Systems<\/span><i><span style=\"font-weight: 400;\">\u201d<\/span><\/i><span style=\"font-weight: 400;\"> will be a most welcome and invaluable reference.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><i><span style=\"font-weight: 400;\">We modeled the <\/span><\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\"><i><span style=\"font-weight: 400;\">Cybersecurity Canon<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> after the Baseball Hall of Fame and the Rock &amp; Roll Hall of Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number. Please write a review and nominate your favorite.\u00a0\u00a0<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">The Cybersecurity Canon is a real thing for our community. We have designed it so that you can <\/span><\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\"><i><span style=\"font-weight: 400;\">directly participate in the process<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">. Please do so!<\/span><\/i><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I recommend \u201cEngineering Trustworthy Systems: Get Cybersecurity Design Right the First Time\u201d for the Cybersecurity Canon Hall of Fame.<\/p>\n","protected":false},"author":663,"featured_media":32398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4521,6724],"tags":[4270],"coauthors":[1379],"class_list":["post-101978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canon","category-points-of-view","tag-cybersecurity-canon-review"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/101978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=101978"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/101978\/revisions"}],"predecessor-version":[{"id":101991,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/101978\/revisions\/101991"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/32398"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=101978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=101978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=101978"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=101978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}