@@ -157,7 +157,7 @@ or we'd simply secure a system by denying access to all users.
157157
158158For our purposes, the main takeaway is that security is unique in that
159159it is not just a requirement *for * a system, but it is often best
160- viewed as a system in an of itself, one that must be usable,
160+ viewed as a system in and of itself, one that must be usable,
161161scalable, manageable, evolvable, observable, available, reliable, and
162162so on.
163163
@@ -174,19 +174,20 @@ those principles are applied in practice.
174174
1751752.3.1 Defense in Depth
176176~~~~~~~~~~~~~~~~~~~~~~
177+
177178As we have noted, one of the central challenges in security is that we
178179never know if we have done enough. Much as we try to defend against
179180all possible attacks, there is no way to be sure that we've thought of
180181everything. This is what we mean by saying that security is a negative
181182goal: we aim to be sure that a set of things cannot happen, but we can
182183never quite be sure that all vulnerabilities have been found and
183184mitigated. This leads to the idea of *defense in depth *: layer upon
184- layer of defense, so that even if one layer is penetrated, the next
185- layer is unlikely to be . Only by getting through all the layers of
186- defense will an attacker be able to achieve their goal (of stealing
187- our data, for example). The hope is that with enough layers of
188- defense, the odds of an attacker penetrating all of them becomes
189- vanishingly small.
185+ layer of defense, so that even if one layer is penetrated, there are
186+ multiple layers of defense still in place . Only by getting through
187+ * all * the layers of defense will an attacker be able to achieve their
188+ goal (of stealing our data, for example). The hope is that with enough
189+ layers of defense, the odds of an attacker penetrating all of them
190+ becomes vanishingly small.
190191
191192As a simple example, a corporation might make use of a VPN (virtual
192193private network) to ensure that only authorized users can access
@@ -227,7 +228,10 @@ anything as root on Unix-like systems unless absolutely necessary.
227228
228229In the context of networking, this principle implies that applications
229230which access the network should only have access to the set of
230- resources needed to do their jobs.
231+ resources needed to do their jobs. The concept of zero trust, which
232+ has started to gain popularity as an approach to network security in recent years,
233+ follows closely the idea of least privilege. We return to this topic
234+ in a later chapter.
231235
232236.. feel like there is more detail to provide here.
233237
@@ -298,7 +302,7 @@ the system, the Internet's default behavior does not provide fail-safe
298302defaults. Efforts to revert to a more secure default behavior include
299303such old ideas as network firewalls and virtual private networks,
300304along with more modern approaches such as microsegmentation and
301- zero- trust architectures. We will discuss these developments in a later chapter.
305+ zero trust architectures. We will discuss these developments in a later chapter.
302306
3033072.3.5 Least Common Mechanism
304308~~~~~~~~~~~~~~~~~~~~~~~~~~~~
0 commit comments