Design Strategies for Security and Reliability Management

security by design n.w
1 / 8
Embed
Share

Explore design considerations and strategies for managing security and reliability risks, including principles like Least Privilege, Zero Trust, and Multi-Party Authorization. Learn about understanding adversaries, error budgets, and the commitment to full system lifecycle for enhanced security and reliability. Contact anaoprea@google.com for more information.

  • Security
  • Reliability
  • Management
  • Design Strategies
  • Adversaries

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Security by design Ana Oprea-Oehlmann 2019-11-06 Berlin

  2. Security & Reliability Common properties Different design considerations 2

  3. Managing Security Risk Understanding Adversaries Actor / Role Motive Actions Target 3

  4. Managing Security Risk Design strategies Least Privilege Zero Trust Multi-Party Authorization Auditing and Detection Recovery 4

  5. Managing Reliability Risk Error budgets All stakeholders in the organization have approved a Service Level Objective (SLO) reliability target as being fit for the product. Budget of unreliability (or the error budget) represents the difference between 100% and the reliability target. 5

  6. Managing Reliability Risk Design strategies Least Privilege Zero Touch Multi-Party Authorization Auditing and Detection Recovery 6

  7. Shift Security & Reliability left Commitment to the full system lifecycle. Security & Reliability central elements in the architecture of systems. 7

  8. Thank you! anaoprea@google.com @0xa6ea 8

More Related Content