HomeSoftware EngineeringHigh 10 Weblog Posts of 2021

High 10 Weblog Posts of 2021

Each January on the SEI Weblog, we current the ten most-visited posts of the earlier yr. This yr’s listing of prime 10 is introduced in reverse order and options posts printed between January 1, 2021, and December 31, 2021.

10.High 10 Concerns for Efficient Incident Administration Communications

by Brittany Manley

Communications are important to the general sustainability and success of cybersecurity facilities and incident administration groups, each in occasions of disaster and through regular operations. As a result of significance of communications, and the truth that communications planning is commonly missed, the SEI developed the Information to Efficient Incident Administration Communications as a useful resource for cybersecurity facilities and incident response organizations trying to enhance their communications planning and actions. This weblog submit is customized from that information and it gives 10 issues for efficient communications planning, and issues and greatest practices for communications duties in assist of incident response companies.

Cybersecurity facilities and incident response groups concentrate on mitigating threats by figuring out, defending, detecting, responding to, and recovering from cybersecurity incidents. These groups could also be accountable for many various kinds of communications, starting from communications with constituents to sharing data with most people and the media. How organizations plan for and handle these communications and the way they’re obtained will affect trustworthiness, status, and finally the group’s capacity to carry out incident administration companies successfully. The information gives issues for numerous varieties of communications, together with constituent, media, and disaster communications. It addresses greatest practices for the dissemination of well timed and correct data, together with organizational issues, varieties of communication and content material, and examples of what needs to be included inside communications plans.
Learn all the submit.

9. Advantages and Challenges of SOAR Platforms

by Angela Horneman and Justin Ray

Community and protection analysts are going through rising numbers of safety alerts and, because of fielding these alerts, burnout. Darkish Studying reported that the common safety operations middle (SOC) receives 10,000 alerts every day from layer upon layer of monitoring and detection merchandise. Whereas the cyber menace panorama is marked by an upward trending variety of actors, community and protection analysts should additionally take care of ever-increasing numbers of false positives (typically at charges as excessive as 80 %). As a consequence of useful resource constraints on already overwhelmed analysts, many alerts are ignored, and, in response to a latest report, lower than 10 % of alerts are actively investigated.

Safety orchestration, automation, and response (SOAR) platforms, a time period first coined by Gartner, refers to “applied sciences that allow organizations to gather inputs monitored by the safety operations staff. For instance, alerts from the SIEM system and different safety applied sciences—the place incident evaluation and triage might be carried out by leveraging a mix of human and machine energy—assist outline, prioritize and drive standardized incident response actions. SOAR instruments enable a company to outline incident evaluation and response procedures in a digital workflow format.” It permits already overwhelmed community and protection analysts to compile threat-related knowledge from numerous disparate sources after which use machine studying to automate responses to low-level threats. SOAR was one of many preliminary merchandise geared toward easing the burden not solely on safety operations middle (SOC) analysts, however on different safety professionals equivalent to safety data and occasion administration (SIEM) operators, menace hunters, and compliance managers. On this weblog submit, we introduce and analyze SOAR platforms, which assist analysts cope with alert fatigue.
Learn all the submit.

8. The right way to Use CMMC Evaluation Guides

by Douglas Gardner

To obtain certification beneath the Cybersecurity Maturity Mannequin Certification (CMMC) 1.0 program, Division of Protection (DoD) contractors should efficiently full a third-party evaluation. The DoD has launched two CMMC evaluation guides, the basic instruments for each assessors and contractors to judge adherence to the CMMC framework. This weblog submit is meant for DoD contractors in search of further clarification as they put together for a CMMC evaluation. It is going to stroll you thru the evaluation guides, present fundamental CMMC ideas and definitions, and introduce alternate descriptions of some practices. The aim is to assist these unfamiliar with cybersecurity requirements to raised perceive the CMMC practices and processes.

CMMC is a certification program to enhance supply-chain safety within the protection industrial base (DIB). Finally, the DoD would require that every one DIB firms be licensed at one of many 5 CMMC ranges, which embrace each technical safety controls and maturity processes specified by the Cybersecurity Maturity Mannequin framework.
Learn all the submit.

7. Taking DevSecOps to the Subsequent Stage with Worth Stream Mapping

by Nanette Brown

This submit explores the connection between DevSecOps and worth stream mapping, each of that are rooted within the Lean strategy to programs and workflow. It additionally gives steering on getting ready to conduct worth stream mapping inside a software-intensive product growth atmosphere.

If the main target of post-waterfall software program engineering may very well be summed up in a single phrase, it will be circulation, which focuses on lowering the time for gadgets of buyer worth (e.g., options) to maneuver from idea to deployment. Lean software program growth, DevSecOps, and worth stream administration all consciously orient their ideas and practices round circulation optimization. Though Agile software program strategies don’t typically point out circulation explicitly, circulation optimization is implicit in Agile’s concentrate on the incremental supply of worth and using empowered, cross-functional groups to attenuate impediments and delays.

Movement is an intuitively accessible idea. Rivers circulation except impeded by dams or rock formations. Our minds in a state of circulation are unimpeded, targeted, and energized. Software program growth isn’t involved with the circulation of water or inner consciousness however quite with the circulation of worth to clients and finish customers. By specializing in circulation, we purpose to realize worth as quickly as attainable and to remove any impedance or friction. Iterative and incremental growth, steady integration and supply, minimal viable product, and minimal viable functionality launch all have the speedy circulation of worth as their raison d’etre.

A concentrate on circulation underlies and unifies the subjects mentioned on this submit. Worth streams and DevSecOps are rooted within the premise that organizational boundaries needs to be subsumed within the pursuit of circulation. Worth stream mapping gives a framework for figuring out current limitations to circulation and designing a future state through which worth flows extra freely.
Learn all the submit.

6. Distant Work: Vulnerabilities and Threats to the Enterprise

by Phil Groce

For a lot of organizations, COVID-19 dramatically modified the danger calculation for distant work. In January 2020, many enterprises seen distant work with skepticism; by March, the selection for a lot of was to turn into a remote-first enterprise or to close down.

As one may count on, embracing long-resisted applied sciences and practices has been chaotic for a lot of, with actions dictated primarily by urgency. By now, most enterprises–to the shock of some–have efficiently tailored to the brand new atmosphere. A couple of, equivalent to Twitter and Slack, have even reinvented themselves by selecting to make their distant enterprises everlasting.

Because the pressing menace to enterprise continuity has receded, some IT employees and different stakeholders are discovering time to ask themselves different vital questions: How has this transformation in the best way we work altered our safety posture? How has it modified our assault floor, and what ought to we be doing to defend it? On this weblog submit, I discover the solutions to those questions.
Learn all the submit.

5. A Framework for DevSecOps Evolution and Reaching Steady-Integration/Steady-Supply (CI/CD) Capabilities

by Lyndsi Hughes and Vanessa Jackson

The advantages of working a growth atmosphere with continuous-integration and continuous-delivery (CI/CD) pipeline capabilities and DevSecOps practices are properly documented. Leveraging DevSecOps practices and CI/CD pipelines permits organizations to answer safety and reliability occasions rapidly and effectively and to supply resilient and safe software program on a predictable schedule and price range. Though the choice by administration to undertake this technique could also be simple, the preliminary implementation and ongoing enchancment of the methodology might be difficult and will lead to incomplete adoption or ineffective implementation.

On this and a sequence of future weblog posts, we offer a brand new framework to information organizations within the planning and implementation of a roadmap to purposeful CI/CD pipeline capabilities.

This framework builds on well-established purposes of DevSecOps ideas and gives further steering for making use of DevSecOps ideas to infrastructure operations in an on-premises computing atmosphere by offering an ordered strategy towards implementing essential practices within the phases of adoption, implementation, enchancment, and upkeep of that atmosphere. The framework additionally focuses on the leverage of automation all through the method.
Learn all the submit.

4. Architecting the Way forward for Software program Engineering: A Analysis and Improvement Roadmap

by Anita Carleton, John Robert, Mark Klein, Doug Schmidt, Forrest Shull, John Foreman, Ipek Ozkaya, Robert Cunningham, Charlie Holland, Erin Harper, and Edward Desautels

Software program is important to our nation’s international competitiveness, innovation, and nationwide safety. It additionally ensures our trendy way of life and permits continued advances in protection, infrastructure, healthcare, commerce, training, and leisure. Because the DoD’s federally funded analysis and growth middle (FFRDC) targeted on bettering the follow of software program engineering, the Carnegie Mellon College (CMU) Software program Engineering Institute (SEI) is main the group in making a multi-year analysis and growth imaginative and prescient and roadmap for engineering next-generation software-reliant programs. This weblog submit describes that effort.

Software program Engineering as Strategic Benefit

In a 2020 Nationwide Academy of Science Examine on Air Drive software program sustainment, the U.S. Air Drive acknowledged that “to proceed to be a world-class preventing power, it must be a world-class software program developer.” This idea clearly applies far past the Division of Protection. Software program programs allow world-class healthcare, commerce, training, vitality era, and extra. These programs that run our world are quickly changing into extra knowledge intensive and interconnected, more and more make the most of AI, require larger-scale integration, and should be significantly extra resilient. Consequently, vital funding in software program engineering R&D is required now to allow and guarantee future functionality.
Learn all the submit.

3. Zero Belief Adoption: Managing Threat with Cybersecurity Engineering and Adaptive Threat Evaluation

by Geoff Sanders

Zero belief adoption challenges many organizations. It isn’t a selected expertise to undertake, however a safety initiative that an enterprise should perceive, interpret, and implement. Enterprise safety initiatives are by no means easy, and their aim to enhance cybersecurity posture requires the alignment of a number of stakeholders, programs, acquisitions, and exponentially altering expertise. This alignment is all the time a fancy endeavor and requires cybersecurity technique and engineering to succeed.

On this and a sequence of future posts, we offer an summary of zero belief and administration of its danger with the SEI’s cybersecurity engineering evaluation framework. This adaptive framework incorporates a number of evaluation strategies that deal with lifecycle challenges that organizations face on a zero-trust journey.
Learn all the submit.

2. Necessities in Mannequin-Primarily based Methods Engineering (MBSE)

by Nataliya Shevchenko

Mannequin-based programs engineering (MBSE) is a formalized methodology that helps the necessities, design, evaluation, verification, and validation related to the event of advanced programs. MBSE in a digital-modeling atmosphere gives benefits that document-based programs engineering can not present. These benefits have led to elevated and rising adoption since MBSE can save prices by lowering growth time and enhance the flexibility to supply safe and accurately functioning software program. The SEI CERT Division has begun researching how MBSE can be used to mitigate safety dangers early within the system-development course of in order that programs are safe by design, in distinction to the widespread follow of including security measures later within the growth course of.

Though MBSE doesn’t dictate any particular course of, any MBSE course of ought to cowl 4 programs engineering domains: necessities/capabilities, habits, structure/construction, and verification and validation. On this weblog submit, I describe how MBSE addresses the primary of those domains: necessities, which describe the issue(s) to deal with.
Learn all the submit.

1. The Present State of DevSecOps Metrics

by Invoice Nichols

Within the BBC documentary sequence Connections, science historian James Burke traced how technical improvements construct on each other over time. New capabilities create new potentialities, new challenges, and new wants. This sample additionally applies to the evolution of software program engineering, the place modifications in software program engineering practices are sometimes pushed by modifications in underlying applied sciences. For instance, the follow of frequent compiling and testing of code was a legacy of the post-punchcard period within the Eighties. When devoted desktop compilers elevated the comfort of compilation, it turned simpler for engineers to compile and take a look at extra ceaselessly, which then turned a standard follow.

This evolution continues at present within the practices we affiliate with DevSecOps, equivalent to steady integration (CI), steady supply/deployment (CD), and infrastructure as code, all of that are made attainable by enhancements in underlying expertise that automate the development-to-production pipeline. These DevSecOps practices will doubtlessly generate extra details about growth and operational efficiency than has ever been available earlier than. On this weblog submit, I talk about the methods through which DevSecOps practices yield beneficial details about software program efficiency that’s prone to result in improvements in software program engineering metrics.
Learn all the submit.

Trying Forward in 2022

Within the coming months, search for posts highlighting our work in constructing a cybersecurity engineering technique, synthetic intelligence, digital engineering, and edge computing. We publish a brand new submit on the SEI Weblog each Monday morning.



Please enter your comment!
Please enter your name here

Most Popular

Recent Comments