The presentation discusses the importance of establishing trust in computer systems and processes, and challenges the concept of 'zero trust' by suggesting that it should be renamed to 'zero implicit trust' to make it explicit.
Understanding the context of a system is important in determining how much to spend on defending it and what the value of the thing being defended is
Establishing trust in the foundation of a system is crucial before building on top of it
Developing a framework for trust involves asking questions about what is being trusted and why, and what the consequences are if that trust is violated
The blast radius of an incident should be kept small to minimize the impact of a breach or failure
The concept of 'zero trust' should be renamed to 'zero implicit trust' to make it explicit that something is being trusted and to encourage proper analysis and risk assessment
Authors: Eric Tice, Josh Bressers, Tracy Miranda, John Yeoh
2022-10-28
tldr - powered by Generative AI
Real-world data on software supply chain security can help organizations identify the most important actions to improve the security of their software. A panel of experts examines key data points from recent surveys and reports and provides actionable steps organizations and projects can take to secure their software supply chain.
Real-world data can help organizations decide where to focus and when to pivot
There is plenty of eye-opening data from surveys and reports on the security of cloud-native and open source software, as well as the security of the software supply chain as a whole
Identifying the most important actions to improve the security of open source projects or software applications is critical
A panel of experts examines key data points from recent surveys and reports and provides actionable steps organizations and projects can take to secure their software supply chain