Discussion about this post

User's avatar
Andre Piazza's avatar

First impression after re-reading the 10 "Immutable" Laws of Security:

- heavily skewed towards the endpoint - which was the reality at the era, for sure;

- heavily biased towards technology - even though it puts the user or owner front and center, it still maps concepts against technology (passwords, antivirus, device, OS, etc). It abstains from systemic approaches in favor of a technological bias;

- if the same team were to write the "immutable" laws of security today, it would be: the 100 Immutable Laws of Security.

In short, even though the laws remain "immutable", they are could be rebranded to certain extent just the "basic laws of the endpoint" - a limited subset of cybersecurity. The network, the apps, the internal and external attack surfaces, the identity and access, and any other segment of modern cybersecurity we can conceive will still be missing their own set of "immutable" laws.

Immutable over the decade has lost it's actionable, transformational power that we derived when we first read them. Yeah, weak user behavior on a device will make the security crumble. So what? Now we have systems that mitigate risks behind the weak link in any security system they didn't have in those days. Zero Trust is by large built with this premise in mind.

The power of revisiting these laws is precisely this: realizing its beauty at the time of inception, its limitations, and potentially deriving new concepts, tactics, or updated laws based on the concept the original ones manifest.

Thanks for reflecting through these, Ross.

Expand full comment

No posts