Wednesday, January 12, 2022
HomeSoftware EngineeringPrime 10 Weblog Posts of 2021

Prime 10 Weblog Posts of 2021


Each January on the SEI Weblog, we current the ten most-visited posts of the earlier 12 months. This 12 months’s checklist of prime 10 is introduced in reverse order and options posts revealed between January 1, 2021, and December 31, 2021.

10. Prime 10 Issues for Efficient Incident Administration Communications

by Brittany Manley

Communications are important to the general sustainability and success of cybersecurity facilities and incident administration groups, each in occasions of disaster and through regular operations. Because of the significance of communications, and the truth that communications planning is usually neglected, the SEI developed the Information to Efficient Incident Administration Communications as a useful resource for cybersecurity facilities and incident response organizations trying to enhance their communications planning and actions. This weblog put up is tailored from that information and it offers 10 issues for efficient communications planning, and issues and finest practices for communications obligations in assist of incident response providers.

Cybersecurity facilities and incident response groups deal with mitigating threats by figuring out, defending, detecting, responding to, and recovering from cybersecurity incidents. These groups could also be accountable for many several types of communications, starting from communications with constituents to sharing data with most of the people and the media. How organizations plan for and handle these communications and the way they’re obtained will affect trustworthiness, fame, and in the end the group’s skill to carry out incident administration providers successfully. The information offers issues for varied sorts of communications, together with constituent, media, and disaster communications. It addresses finest practices for the dissemination of well timed and correct data, together with organizational issues, sorts of communication and content material, and examples of what must be included inside communications plans.
Learn all the put up.

9. Advantages and Challenges of SOAR Platforms

by Angela Horneman and Justin Ray

Community and protection analysts are going through growing numbers of safety alerts and, on account of fielding these alerts, burnout. Darkish Studying reported that the common safety operations middle (SOC) receives 10,000 alerts every day from layer upon layer of monitoring and detection merchandise. Whereas the cyber menace panorama is marked by an upward trending variety of actors, community and protection analysts should additionally deal with ever-increasing numbers of false positives (typically at charges as excessive as 80 %). Resulting from useful resource constraints on already overwhelmed analysts, many alerts are ignored, and, in keeping with a current report, lower than 10 % of alerts are actively investigated.

Safety orchestration, automation, and response (SOAR) platforms, a time period first coined by Gartner, refers to “applied sciences that allow organizations to gather inputs monitored by the safety operations crew. For instance, alerts from the SIEM system and different safety applied sciences—the place incident evaluation and triage will be carried out by leveraging a mix of human and machine energy—assist outline, prioritize and drive standardized incident response actions. SOAR instruments enable a corporation to outline incident evaluation and response procedures in a digital workflow format.” It permits already overwhelmed community and protection analysts to compile threat-related information from varied disparate sources after which use machine studying to automate responses to low-level threats. SOAR was one of many preliminary merchandise geared toward easing the burden not solely on safety operations middle (SOC) analysts, however on different safety professionals resembling safety data and occasion administration (SIEM) operators, menace hunters, and compliance managers. On this weblog put up, we introduce and analyze SOAR platforms, which assist analysts cope with alert fatigue.
Learn all the put up.

8. The right way to Use CMMC Evaluation Guides

by Douglas Gardner

To obtain certification beneath the Cybersecurity Maturity Mannequin Certification (CMMC) 1.0 program, Division of Protection (DoD) contractors should efficiently full a third-party evaluation. The DoD has launched two CMMC evaluation guides, the elemental instruments for each assessors and contractors to judge adherence to the CMMC framework. This weblog put up is meant for DoD contractors searching for further clarification as they put together for a CMMC evaluation. It’s going to stroll you thru the evaluation guides, present fundamental CMMC ideas and definitions, and introduce alternate descriptions of some practices. The objective is to assist these unfamiliar with cybersecurity requirements to raised perceive the CMMC practices and processes.

CMMC is a certification program to enhance supply-chain safety within the protection industrial base (DIB). Ultimately, the DoD would require that each one DIB firms be licensed at one of many 5 CMMC ranges, which embrace each technical safety controls and maturity processes specified by the Cybersecurity Maturity Mannequin framework.
Learn all the put up.

7. Taking DevSecOps to the Subsequent Stage with Worth Stream Mapping

by Nanette Brown

This put up explores the connection between DevSecOps and worth stream mapping, each of that are rooted within the Lean strategy to techniques and workflow. It additionally offers steerage on getting ready to conduct worth stream mapping inside a software-intensive product improvement surroundings.

If the main target of post-waterfall software program engineering may very well be summed up in a single phrase, it could be movement, which focuses on lowering the time for objects of buyer worth (e.g., options) to maneuver from idea to deployment. Lean software program improvement, DevSecOps, and worth stream administration all consciously orient their ideas and practices round movement optimization. Though Agile software program strategies don’t usually point out movement explicitly, movement optimization is implicit in Agile’s deal with the incremental supply of worth and the usage of empowered, cross-functional groups to attenuate impediments and delays.

Circulate is an intuitively accessible idea. Rivers movement except impeded by dams or rock formations. Our minds in a state of movement are unimpeded, centered, and energized. Software program improvement just isn’t involved with the movement of water or inside consciousness however quite with the movement of worth to clients and finish customers. By specializing in movement, we purpose to attain worth as quickly as potential and to remove any impedance or friction. Iterative and incremental improvement, steady integration and supply, minimal viable product, and minimal viable functionality launch all have the speedy movement of worth as their raison d’etre.

A deal with movement underlies and unifies the subjects mentioned on this put up. Worth streams and DevSecOps are rooted within the premise that organizational boundaries must be subsumed within the pursuit of movement. Worth stream mapping offers a framework for figuring out present obstacles to movement and designing a future state by which worth flows extra freely.
Learn all the put up.

6. Distant Works: Vulnerabilities and Threats to the Enterprise

by Nathaniel Richmond

Managing supply-chain dangers from the brand new coronavirus outbreak is personally essential to me. Whereas my first concern—like everybody else’s—is mitigating the direct public-health danger of the COVID-19 pandemic, I’ve a salient concern in regards to the health-related dangers that may very well be launched if the worldwide manufacturing provide chain for medical units is disrupted: I’m a Sort I diabetic who depends on a steady glucose monitor (CGM) machine to watch my blood sugar and an insulin pump for insulin injections. On this weblog put up, I discover risk-management methods that distributors can use to organize and account for disruptions to {hardware} and software program provide chains—disruptions that might have an effect on units that finish customers depend on.
Learn all the put up.

5. A Framework for DevSecOps Evolution and Reaching Steady-Integration/Steady-Supply (CI/CD) Capabilities

by Lyndsi Hughes and Vanessa Jackson

The advantages of working a improvement surroundings with continuous-integration and continuous-delivery (CI/CD) pipeline capabilities and DevSecOps practices are properly documented. Leveraging DevSecOps practices and CI/CD pipelines permits organizations to reply to safety and reliability occasions rapidly and effectively and to provide resilient and safe software program on a predictable schedule and funds. Though the choice by administration to undertake this system could also be straightforward, the preliminary implementation and ongoing enchancment of the methodology will be difficult and will lead to incomplete adoption or ineffective implementation.

On this and a sequence of future weblog posts, we offer a brand new framework to information organizations within the planning and implementation of a roadmap to practical CI/CD pipeline capabilities.

This framework builds on well-established functions of DevSecOps ideas and offers further steerage for making use of DevSecOps ideas to infrastructure operations in an on-premises computing surroundings by offering an ordered strategy towards implementing crucial practices within the phases of adoption, implementation, enchancment, and upkeep of that surroundings. The framework additionally focuses on the leverage of automation all through the method.
Learn all the put up.

4. Architecting the Way forward for Software program Engineering: A Analysis and Growth Roadmap

by Anita Carleton, John Robert, Mark Klein, Doug Schmidt, Forrest Shull, John Foreman, Ipek Ozkaya, Robert Cunningham, Charlie Holland, Erin Harper, and Edward Desautels

Software program is significant to our nation’s international competitiveness, innovation, and nationwide safety. It additionally ensures our trendy lifestyle and permits continued advances in protection, infrastructure, healthcare, commerce, training, and leisure. Because the DoD’s federally funded analysis and improvement middle (FFRDC) centered on enhancing the observe of software program engineering, the Carnegie Mellon College (CMU) Software program Engineering Institute (SEI) is main the group in making a multi-year analysis and improvement imaginative and prescient and roadmap for engineering next-generation software-reliant techniques. This weblog put up describes that effort.

Software program Engineering as Strategic Benefit

In a 2020 Nationwide Academy of Science Examine on Air Pressure software program sustainment, the U.S. Air Pressure acknowledged that “to proceed to be a world-class preventing power, it must be a world-class software program developer.” This idea clearly applies far past the Division of Protection. Software program techniques allow world-class healthcare, commerce, training, power era, and extra. These techniques that run our world are quickly turning into extra information intensive and interconnected, more and more make the most of AI, require larger-scale integration, and have to be significantly extra resilient. Consequently, important funding in software program engineering R&D is required now to allow and guarantee future functionality.
Learn all the put up.

3. Zero Belief Adoption: Managing Threat with Cybersecurity Engineering and Adaptive Threat Evaluation

by Geoff Sanders

Zero belief adoption challenges many organizations. It isn’t a particular expertise to undertake, however a safety initiative that an enterprise should perceive, interpret, and implement. Enterprise safety initiatives are by no means easy, and their objective to enhance cybersecurity posture requires the alignment of a number of stakeholders, techniques, acquisitions, and exponentially altering expertise. This alignment is at all times a posh enterprise and requires cybersecurity technique and engineering to succeed.

On this and a sequence of future posts, we offer an outline of zero belief and administration of its danger with the SEI’s cybersecurity engineering evaluation framework. This adaptive framework incorporates a number of evaluation strategies that deal with lifecycle challenges that organizations face on a zero-trust journey.
Learn all the put up.

2. Necessities in Mannequin-Based mostly Programs Engineering (MBSE)

by Nataliya Shevchenko

Mannequin-based techniques engineering (MBSE) is a formalized methodology that helps the necessities, design, evaluation, verification, and validation related to the event of advanced techniques. MBSE in a digital-modeling surroundings offers benefits that document-based techniques engineering can not present. These benefits have led to elevated and rising adoption since MBSE can save prices by lowering improvement time and enhance the flexibility to provide safe and appropriately functioning software program. The SEI CERT Division has begun researching how MBSE will also be used to mitigate safety dangers early within the system-development course of in order that techniques are safe by design, in distinction to the widespread observe of including security measures later within the improvement course of.

Though MBSE doesn’t dictate any particular course of, any MBSE course of ought to cowl 4 techniques engineering domains: necessities/capabilities, habits, structure/construction, and verification and validation. On this weblog put up, I describe how MBSE addresses the primary of those domains: necessities, which describe the issue(s) to handle.
Learn all the put up.

1. The Present State of DevSecOps Metrics

by Invoice Nichols

Within the BBC documentary sequence Connections, science historian James Burke traced how technical improvements construct on each other over time. New capabilities create new prospects, new challenges, and new wants. This sample additionally applies to the evolution of software program engineering, the place modifications in software program engineering practices are sometimes pushed by modifications in underlying applied sciences. For instance, the observe of frequent compiling and testing of code was a legacy of the post-punchcard period within the Nineteen Eighties. When devoted desktop compilers elevated the comfort of compilation, it grew to become simpler for engineers to compile and take a look at extra continuously, which then grew to become a standard observe.

This evolution continues at this time within the practices we affiliate with DevSecOps, resembling steady integration (CI), steady supply/deployment (CD), and infrastructure as code, all of that are made potential by enhancements in underlying expertise that automate the development-to-production pipeline. These DevSecOps practices will doubtlessly generate extra details about improvement and operational efficiency than has ever been available earlier than. On this weblog put up, I talk about the methods by which DevSecOps practices yield invaluable details about software program efficiency that’s prone to result in improvements in software program engineering metrics.
Learn all the put up.

Trying Forward in 2022

Within the coming months, search for posts highlighting our work in constructing a cybersecurity engineering technique, synthetic intelligence, digital engineering, and edge computing. We publish a brand new put up on the SEI Weblog each Monday morning.

RELATED ARTICLES

Most Popular

Recent Comments