Friday, March 25, 2022
HomeSoftware EngineeringPrime 10 Weblog Posts of 2021

Prime 10 Weblog Posts of 2021


Each January on the SEI Weblog, we current the ten most-visited posts of the earlier 12 months. This 12 months’s record of prime 10 is offered in reverse order and options posts printed between January 1, 2021, and December 31, 2021.

10.Prime 10 Issues for Efficient Incident Administration Communications

by Brittany Manley

Communications are important to the general sustainability and success of cybersecurity facilities and incident administration groups, each in occasions of disaster and through regular operations. As a result of significance of communications, and the truth that communications planning is usually neglected, the SEI developed the Information to Efficient Incident Administration Communications as a useful resource for cybersecurity facilities and incident response organizations seeking to enhance their communications planning and actions. This weblog put up is tailored from that information and it gives 10 issues for efficient communications planning, and issues and greatest practices for communications tasks in assist of incident response providers.

Cybersecurity facilities and incident response groups deal with mitigating threats by figuring out, defending, detecting, responding to, and recovering from cybersecurity incidents. These groups could also be chargeable for many several types of communications, starting from communications with constituents to sharing data with most of the people and the media. How organizations plan for and handle these communications and the way they’re obtained will affect trustworthiness, fame, and finally the group’s capacity to carry out incident administration providers successfully. The information gives issues for varied forms of communications, together with constituent, media, and disaster communications. It addresses greatest practices for the dissemination of well timed and correct data, together with organizational issues, forms of communication and content material, and examples of what ought to be included inside communications plans.
Learn the complete put up.

9. Advantages and Challenges of SOAR Platforms

by Angela Horneman and Justin Ray

Community and protection analysts are dealing with rising numbers of safety alerts and, because of fielding these alerts, burnout. Darkish Studying reported that the common safety operations heart (SOC) receives 10,000 alerts every day from layer upon layer of monitoring and detection merchandise. Whereas the cyber menace panorama is marked by an upward trending variety of actors, community and protection analysts should additionally take care of ever-increasing numbers of false positives (typically at charges as excessive as 80 %). Attributable to useful resource constraints on already overwhelmed analysts, many alerts are ignored, and, in accordance with a latest report, lower than 10 % of alerts are actively investigated.

Safety orchestration, automation, and response (SOAR) platforms, a time period first coined by Gartner, refers to “applied sciences that allow organizations to gather inputs monitored by the safety operations crew. For instance, alerts from the SIEM system and different safety applied sciences—the place incident evaluation and triage may be carried out by leveraging a mixture of human and machine energy—assist outline, prioritize and drive standardized incident response actions. SOAR instruments permit a company to outline incident evaluation and response procedures in a digital workflow format.” It permits already overwhelmed community and protection analysts to compile threat-related information from varied disparate sources after which use machine studying to automate responses to low-level threats. SOAR was one of many preliminary merchandise geared toward easing the burden not solely on safety operations heart (SOC) analysts, however on different safety professionals similar to safety data and occasion administration (SIEM) operators, menace hunters, and compliance managers. On this weblog put up, we introduce and analyze SOAR platforms, which assist analysts cope with alert fatigue.
Learn the complete put up.

8. Learn how to Use CMMC Evaluation Guides

by Douglas Gardner

To obtain certification underneath the Cybersecurity Maturity Mannequin Certification (CMMC) 1.0 program, Division of Protection (DoD) contractors should efficiently full a third-party evaluation. The DoD has launched two CMMC evaluation guides, the basic instruments for each assessors and contractors to guage adherence to the CMMC framework. This weblog put up is meant for DoD contractors on the lookout for further clarification as they put together for a CMMC evaluation. It’s going to stroll you thru the evaluation guides, present primary CMMC ideas and definitions, and introduce alternate descriptions of some practices. The purpose is to assist these unfamiliar with cybersecurity requirements to raised perceive the CMMC practices and processes.

CMMC is a certification program to enhance supply-chain safety within the protection industrial base (DIB). Ultimately, the DoD would require that each one DIB corporations be licensed at one of many 5 CMMC ranges, which embody each technical safety controls and maturity processes specified by the Cybersecurity Maturity Mannequin framework.
Learn the complete put up.

7. Taking DevSecOps to the Subsequent Degree with Worth Stream Mapping

by Nanette Brown

This put up explores the connection between DevSecOps and worth stream mapping, each of that are rooted within the Lean strategy to methods and workflow. It additionally gives steerage on getting ready to conduct worth stream mapping inside a software-intensive product growth surroundings.

If the main focus of post-waterfall software program engineering might be summed up in a single phrase, it could be movement, which focuses on decreasing the time for objects of buyer worth (e.g., options) to maneuver from idea to deployment. Lean software program growth, DevSecOps, and worth stream administration all consciously orient their rules and practices round movement optimization. Though Agile software program strategies don’t typically point out movement explicitly, movement optimization is implicit in Agile’s deal with the incremental supply of worth and using empowered, cross-functional groups to attenuate impediments and delays.

Circulate is an intuitively accessible idea. Rivers movement except impeded by dams or rock formations. Our minds in a state of movement are unimpeded, targeted, and energized. Software program growth will not be involved with the movement of water or inside consciousness however moderately with the movement of worth to clients and finish customers. By specializing in movement, we purpose to attain worth as quickly as doable and to remove any impedance or friction. Iterative and incremental growth, steady integration and supply, minimal viable product, and minimal viable functionality launch all have the fast movement of worth as their raison d’etre.

A deal with movement underlies and unifies the subjects mentioned on this put up. Worth streams and DevSecOps are rooted within the premise that organizational boundaries ought to be subsumed within the pursuit of movement. Worth stream mapping gives a framework for figuring out current obstacles to movement and designing a future state through which worth flows extra freely.
Learn the complete put up.

6. Distant Work: Vulnerabilities and Threats to the Enterprise

by Phil Groce

For a lot of organizations, COVID-19 dramatically modified the chance calculation for distant work. In January 2020, many enterprises seen distant work with skepticism; by March, the selection for a lot of was to develop into a remote-first enterprise or to close down.

As one may count on, embracing long-resisted applied sciences and practices has been chaotic for a lot of, with actions dictated primarily by urgency. By now, most enterprises–to the shock of some–have efficiently tailored to the brand new surroundings. A couple of, similar to Twitter and Slack, have even reinvented themselves by selecting to make their distant enterprises everlasting.

Because the pressing menace to enterprise continuity has receded, some IT employees and different stakeholders are discovering time to ask themselves different necessary questions: How has this transformation in the way in which we work altered our safety posture? How has it modified our assault floor, and what ought to we be doing to defend it? On this weblog put up, I discover the solutions to those questions.
Learn the complete put up.

5. A Framework for DevSecOps Evolution and Attaining Steady-Integration/Steady-Supply (CI/CD) Capabilities

by Lyndsi Hughes and Vanessa Jackson

The advantages of working a growth surroundings with continuous-integration and continuous-delivery (CI/CD) pipeline capabilities and DevSecOps practices are effectively documented. Leveraging DevSecOps practices and CI/CD pipelines permits organizations to reply to safety and reliability occasions shortly and effectively and to provide resilient and safe software program on a predictable schedule and finances. Though the choice by administration to undertake this system could also be simple, the preliminary implementation and ongoing enchancment of the methodology may be difficult and will end in incomplete adoption or ineffective implementation.

On this and a collection of future weblog posts, we offer a brand new framework to information organizations within the planning and implementation of a roadmap to practical CI/CD pipeline capabilities.

This framework builds on well-established functions of DevSecOps rules and gives further steerage for making use of DevSecOps rules to infrastructure operations in an on-premises computing surroundings by offering an ordered strategy towards implementing essential practices within the levels of adoption, implementation, enchancment, and upkeep of that surroundings. The framework additionally focuses on the leverage of automation all through the method.
Learn the complete put up.

4. Architecting the Way forward for Software program Engineering: A Analysis and Growth Roadmap

by Anita Carleton, John Robert, Mark Klein, Doug Schmidt, Forrest Shull, John Foreman, Ipek Ozkaya, Robert Cunningham, Charlie Holland, Erin Harper, and Edward Desautels

Software program is important to our nation’s world competitiveness, innovation, and nationwide safety. It additionally ensures our fashionable lifestyle and permits continued advances in protection, infrastructure, healthcare, commerce, schooling, and leisure. Because the DoD’s federally funded analysis and growth heart (FFRDC) targeted on enhancing the apply of software program engineering, the Carnegie Mellon College (CMU) Software program Engineering Institute (SEI) is main the neighborhood in making a multi-year analysis and growth imaginative and prescient and roadmap for engineering next-generation software-reliant methods. This weblog put up describes that effort.

Software program Engineering as Strategic Benefit

In a 2020 Nationwide Academy of Science Examine on Air Pressure software program sustainment, the U.S. Air Pressure acknowledged that “to proceed to be a world-class combating power, it must be a world-class software program developer.” This idea clearly applies far past the Division of Protection. Software program methods allow world-class healthcare, commerce, schooling, power era, and extra. These methods that run our world are quickly changing into extra information intensive and interconnected, more and more make the most of AI, require larger-scale integration, and have to be significantly extra resilient. Consequently, important funding in software program engineering R&D is required now to allow and guarantee future functionality.
Learn the complete put up.

3. Zero Belief Adoption: Managing Threat with Cybersecurity Engineering and Adaptive Threat Evaluation

by Geoff Sanders

Zero belief adoption challenges many organizations. It isn’t a selected know-how to undertake, however a safety initiative that an enterprise should perceive, interpret, and implement. Enterprise safety initiatives are by no means easy, and their purpose to enhance cybersecurity posture requires the alignment of a number of stakeholders, methods, acquisitions, and exponentially altering know-how. This alignment is at all times a posh endeavor and requires cybersecurity technique and engineering to succeed.

On this and a collection of future posts, we offer an outline of zero belief and administration of its danger with the SEI’s cybersecurity engineering evaluation framework. This adaptive framework incorporates a number of evaluation strategies that handle lifecycle challenges that organizations face on a zero-trust journey.
Learn the complete put up.

2. Necessities in Mannequin-Primarily based Programs Engineering (MBSE)

by Nataliya Shevchenko

Mannequin-based methods engineering (MBSE) is a formalized methodology that helps the necessities, design, evaluation, verification, and validation related to the event of complicated methods. MBSE in a digital-modeling surroundings gives benefits that document-based methods engineering can not present. These benefits have led to elevated and rising adoption since MBSE can save prices by decreasing growth time and enhance the power to provide safe and accurately functioning software program. The SEI CERT Division has begun researching how MBSE can be used to mitigate safety dangers early within the system-development course of in order that methods are safe by design, in distinction to the frequent apply of including safety features later within the growth course of.

Though MBSE doesn’t dictate any particular course of, any MBSE course of ought to cowl 4 methods engineering domains: necessities/capabilities, conduct, structure/construction, and verification and validation. On this weblog put up, I describe how MBSE addresses the primary of those domains: necessities, which describe the issue(s) to handle.
Learn the complete put up.

1. The Present State of DevSecOps Metrics

by Invoice Nichols

Within the BBC documentary collection Connections, science historian James Burke traced how technical improvements construct on each other over time. New capabilities create new potentialities, new challenges, and new wants. This sample additionally applies to the evolution of software program engineering, the place adjustments in software program engineering practices are sometimes pushed by adjustments in underlying applied sciences. For instance, the apply of frequent compiling and testing of code was a legacy of the post-punchcard period within the Eighties. When devoted desktop compilers elevated the comfort of compilation, it turned simpler for engineers to compile and take a look at extra incessantly, which then turned a standard apply.

This evolution continues right this moment within the practices we affiliate with DevSecOps, similar to steady integration (CI), steady supply/deployment (CD), and infrastructure as code, all of that are made doable by enhancements in underlying know-how that automate the development-to-production pipeline. These DevSecOps practices will probably generate extra details about growth and operational efficiency than has ever been available earlier than. On this weblog put up, I focus on the methods through which DevSecOps practices yield invaluable details about software program efficiency that’s prone to result in improvements in software program engineering metrics.
Learn the complete put up.

Trying Forward in 2022

Within the coming months, search for posts highlighting our work in constructing a cybersecurity engineering technique, synthetic intelligence, digital engineering, and edge computing. We publish a brand new put up on the SEI Weblog each Monday morning.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments