Saturday, March 19, 2022
HomeTechnologyPrime 10 Weblog Posts of 2021

Prime 10 Weblog Posts of 2021


Each January on the SEI Weblog, we current the ten most-visited posts of the earlier yr. This yr’s record of prime 10 is introduced in reverse order and options posts revealed between January 1, 2021, and December 31, 2021.

10. Prime 10 Issues for Efficient Incident Administration Communications

by Brittany Manley

Communications are important to the general sustainability and success of cybersecurity facilities and incident administration groups, each in instances of disaster and through regular operations. Because of the significance of communications, and the truth that communications planning is usually ignored, the SEI developed the Information to Efficient Incident Administration Communications as a useful resource for cybersecurity facilities and incident response organizations trying to enhance their communications planning and actions. This weblog submit is customized from that information and it gives 10 concerns for efficient communications planning, and concerns and finest practices for communications duties in assist of incident response companies.

Cybersecurity facilities and incident response groups give attention to mitigating threats by figuring out, defending, detecting, responding to, and recovering from cybersecurity incidents. These groups could also be liable for many various kinds of communications, starting from communications with constituents to sharing info with most of the people and the media. How organizations plan for and handle these communications and the way they’re acquired will affect trustworthiness, status, and in the end the group’s skill to carry out incident administration companies successfully. The information gives concerns for varied varieties of communications, together with constituent, media, and disaster communications. It addresses finest practices for the dissemination of well timed and correct info, together with organizational concerns, varieties of communication and content material, and examples of what must be included inside communications plans.
Learn your entire submit.

9. Advantages and Challenges of SOAR Platforms

by Angela Horneman and Justin Ray

Community and protection analysts are going through growing numbers of safety alerts and, because of fielding these alerts, burnout. Darkish Studying reported that the common safety operations middle (SOC) receives 10,000 alerts every day from layer upon layer of monitoring and detection merchandise. Whereas the cyber menace panorama is marked by an upward trending variety of actors, community and protection analysts should additionally cope with ever-increasing numbers of false positives (typically at charges as excessive as 80 %). Resulting from useful resource constraints on already overwhelmed analysts, many alerts are ignored, and, in line with a current report, lower than 10 % of alerts are actively investigated.

Safety orchestration, automation, and response (SOAR) platforms, a time period first coined by Gartner, refers to “applied sciences that allow organizations to gather inputs monitored by the safety operations crew. For instance, alerts from the SIEM system and different safety applied sciences—the place incident evaluation and triage will be carried out by leveraging a mixture of human and machine energy—assist outline, prioritize and drive standardized incident response actions. SOAR instruments enable a corporation to outline incident evaluation and response procedures in a digital workflow format.” It permits already overwhelmed community and protection analysts to compile threat-related knowledge from varied disparate sources after which use machine studying to automate responses to low-level threats. SOAR was one of many preliminary merchandise aimed toward easing the burden not solely on safety operations middle (SOC) analysts, however on different safety professionals equivalent to safety info and occasion administration (SIEM) operators, menace hunters, and compliance managers. On this weblog submit, we introduce and analyze SOAR platforms, which assist analysts take care of alert fatigue.
Learn your entire submit.

8. Find out how to Use CMMC Evaluation Guides

by Douglas Gardner

To obtain certification underneath the Cybersecurity Maturity Mannequin Certification (CMMC) 1.0 program, Division of Protection (DoD) contractors should efficiently full a third-party evaluation. The DoD has launched two CMMC evaluation guides, the elemental instruments for each assessors and contractors to judge adherence to the CMMC framework. This weblog submit is meant for DoD contractors searching for extra clarification as they put together for a CMMC evaluation. It is going to stroll you thru the evaluation guides, present primary CMMC ideas and definitions, and introduce alternate descriptions of some practices. The purpose is to assist these unfamiliar with cybersecurity requirements to higher perceive the CMMC practices and processes.

CMMC is a certification program to enhance supply-chain safety within the protection industrial base (DIB). Ultimately, the DoD would require that every one DIB firms be licensed at one of many 5 CMMC ranges, which embrace each technical safety controls and maturity processes specified by the Cybersecurity Maturity Mannequin framework.
Learn your entire submit.

7. Taking DevSecOps to the Subsequent Stage with Worth Stream Mapping

by Nanette Brown

This submit explores the connection between DevSecOps and worth stream mapping, each of that are rooted within the Lean method to techniques and workflow. It additionally gives steerage on getting ready to conduct worth stream mapping inside a software-intensive product improvement setting.

If the main target of post-waterfall software program engineering might be summed up in a single phrase, it will be circulation, which focuses on decreasing the time for gadgets of buyer worth (e.g., options) to maneuver from idea to deployment. Lean software program improvement, DevSecOps, and worth stream administration all consciously orient their ideas and practices round circulation optimization. Though Agile software program strategies don’t typically point out circulation explicitly, circulation optimization is implicit in Agile’s give attention to the incremental supply of worth and the usage of empowered, cross-functional groups to reduce impediments and delays.

Circulation is an intuitively accessible idea. Rivers circulation until impeded by dams or rock formations. Our minds in a state of circulation are unimpeded, centered, and energized. Software program improvement shouldn’t be involved with the circulation of water or inside consciousness however fairly with the circulation of worth to prospects and finish customers. By specializing in circulation, we intention to attain worth as quickly as doable and to remove any impedance or friction. Iterative and incremental improvement, steady integration and supply, minimal viable product, and minimal viable functionality launch all have the speedy circulation of worth as their raison d’etre.

A give attention to circulation underlies and unifies the subjects mentioned on this submit. Worth streams and DevSecOps are rooted within the premise that organizational boundaries must be subsumed within the pursuit of circulation. Worth stream mapping gives a framework for figuring out present limitations to circulation and designing a future state by which worth flows extra freely.
Learn your entire submit.

6. Distant Works: Vulnerabilities and Threats to the Enterprise

by Phil Groce

Managing supply-chain dangers from the brand new coronavirus outbreak is personally essential to me. Whereas my first concern—like everybody else’s—is mitigating the direct public-health threat of the COVID-19 pandemic, I’ve a salient concern in regards to the health-related dangers that might be launched if the worldwide manufacturing provide chain for medical units is disrupted: I’m a Sort I diabetic who depends on a steady glucose monitor (CGM) system to observe my blood sugar and an insulin pump for insulin injections. On this weblog submit, I discover risk-management methods that distributors can use to organize and account for disruptions to {hardware} and software program provide chains—disruptions that might have an effect on units that finish customers depend on.
Learn your entire submit.

5. A Framework for DevSecOps Evolution and Attaining Steady-Integration/Steady-Supply (CI/CD) Capabilities

by Lyndsi Hughes and Vanessa Jackson

The advantages of working a improvement setting with continuous-integration and continuous-delivery (CI/CD) pipeline capabilities and DevSecOps practices are nicely documented. Leveraging DevSecOps practices and CI/CD pipelines permits organizations to answer safety and reliability occasions rapidly and effectively and to provide resilient and safe software program on a predictable schedule and funds. Though the choice by administration to undertake this technique could also be simple, the preliminary implementation and ongoing enchancment of the methodology will be difficult and will lead to incomplete adoption or ineffective implementation.

On this and a sequence of future weblog posts, we offer a brand new framework to information organizations within the planning and implementation of a roadmap to purposeful CI/CD pipeline capabilities.

This framework builds on well-established functions of DevSecOps ideas and gives extra steerage for making use of DevSecOps ideas to infrastructure operations in an on-premises computing setting by offering an ordered method towards implementing important practices within the levels of adoption, implementation, enchancment, and upkeep of that setting. The framework additionally focuses on the leverage of automation all through the method.
Learn your entire submit.

4. Architecting the Way forward for Software program Engineering: A Analysis and Growth Roadmap

by Anita Carleton, John Robert, Mark Klein, Doug Schmidt, Forrest Shull, John Foreman, Ipek Ozkaya, Robert Cunningham, Charlie Holland, Erin Harper, and Edward Desautels

Software program is significant to our nation’s international competitiveness, innovation, and nationwide safety. It additionally ensures our fashionable way of life and permits continued advances in protection, infrastructure, healthcare, commerce, schooling, and leisure. Because the DoD’s federally funded analysis and improvement middle (FFRDC) centered on enhancing the follow of software program engineering, the Carnegie Mellon College (CMU) Software program Engineering Institute (SEI) is main the group in making a multi-year analysis and improvement imaginative and prescient and roadmap for engineering next-generation software-reliant techniques. This weblog submit describes that effort.

Software program Engineering as Strategic Benefit

In a 2020 Nationwide Academy of Science Research on Air Power software program sustainment, the U.S. Air Power acknowledged that “to proceed to be a world-class combating power, it must be a world-class software program developer.” This idea clearly applies far past the Division of Protection. Software program techniques allow world-class healthcare, commerce, schooling, power era, and extra. These techniques that run our world are quickly changing into extra knowledge intensive and interconnected, more and more make the most of AI, require larger-scale integration, and have to be significantly extra resilient. Consequently, vital funding in software program engineering R&D is required now to allow and guarantee future functionality.
Learn your entire submit.

3. Zero Belief Adoption: Managing Threat with Cybersecurity Engineering and Adaptive Threat Evaluation

by Geoff Sanders

Zero belief adoption challenges many organizations. It isn’t a particular know-how to undertake, however a safety initiative that an enterprise should perceive, interpret, and implement. Enterprise safety initiatives are by no means easy, and their purpose to enhance cybersecurity posture requires the alignment of a number of stakeholders, techniques, acquisitions, and exponentially altering know-how. This alignment is all the time a posh enterprise and requires cybersecurity technique and engineering to succeed.

On this and a sequence of future posts, we offer an summary of zero belief and administration of its threat with the SEI’s cybersecurity engineering evaluation framework. This adaptive framework incorporates a number of evaluation strategies that deal with lifecycle challenges that organizations face on a zero-trust journey.
Learn your entire submit.

2. Necessities in Mannequin-Primarily based Programs Engineering (MBSE)

by Nataliya Shevchenko

Mannequin-based techniques engineering (MBSE) is a formalized methodology that helps the necessities, design, evaluation, verification, and validation related to the event of complicated techniques. MBSE in a digital-modeling setting gives benefits that document-based techniques engineering can not present. These benefits have led to elevated and rising adoption since MBSE can save prices by decreasing improvement time and enhance the power to provide safe and appropriately functioning software program. The SEI CERT Division has begun researching how MBSE can be used to mitigate safety dangers early within the system-development course of in order that techniques are safe by design, in distinction to the widespread follow of including safety features later within the improvement course of.

Though MBSE doesn’t dictate any particular course of, any MBSE course of ought to cowl 4 techniques engineering domains: necessities/capabilities, conduct, structure/construction, and verification and validation. On this weblog submit, I describe how MBSE addresses the primary of those domains: necessities, which describe the issue(s) to handle.
Learn your entire submit.

1. The Present State of DevSecOps Metrics

by Invoice Nichols

Within the BBC documentary sequence Connections, science historian James Burke traced how technical improvements construct on each other over time. New capabilities create new prospects, new challenges, and new wants. This sample additionally applies to the evolution of software program engineering, the place modifications in software program engineering practices are sometimes pushed by modifications in underlying applied sciences. For instance, the follow of frequent compiling and testing of code was a legacy of the post-punchcard period within the Nineteen Eighties. When devoted desktop compilers elevated the comfort of compilation, it grew to become simpler for engineers to compile and take a look at extra continuously, which then grew to become a standard follow.

This evolution continues at the moment within the practices we affiliate with DevSecOps, equivalent to steady integration (CI), steady supply/deployment (CD), and infrastructure as code, all of that are made doable by enhancements in underlying know-how that automate the development-to-production pipeline. These DevSecOps practices will probably generate extra details about improvement and operational efficiency than has ever been available earlier than. On this weblog submit, I focus on the methods by which DevSecOps practices yield invaluable details about software program efficiency that’s more likely to result in improvements in software program engineering metrics.
Learn your entire submit.

Wanting Forward in 2022

Within the coming months, search for posts highlighting our work in constructing a cybersecurity engineering technique, synthetic intelligence, digital engineering, and edge computing. We publish a brand new submit on the SEI Weblog each Monday morning.



Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments