“Cyber Immune approach to design” article series

The evolution of cybersecurity is a race between bad actors and infosec professionals, with the latter often trying to catch up. Now that digital technology has found its way into manufacturing, energy, transportation, finance, and other sectors, and even into our day-to-day lives, a cyberincident has the potential to cause large-scale damage. Playing catch-up is not an option any more.

The classic approach to this problem is to apply external protections to an inherently insecure system. An alternative is to deploy systems that are secure by design, that is, have a reduced attack surface and prevent attacks from spreading across the infrastructure.

For a closer look at implementation of these systems, check out the series by Kaspersky security analysts Alexey Matyushin and Ekaterina Rudina. They are both working on the Cyber Immune approach and designing national standards for internet of things systems.

Read articles

  1. Security challenges of modern cybersystems
  2. Constructive information security – Security by Design
  3. Process requirements: Security objectives and threat modeling
  4. Process requirements: Creating an architecture and verifying code quality
  5. Requirements for architecture and design: Isolation and control
  6. Requirements for architecture and design: Cyber Immune integrity model
  7. Requirements for architecture and design: Minimizing the TCB
  8. The strengths of Cyber Immune systems and associated development costs

The evolution of cybersecurity is a race between bad actors and infosec professionals, with the latter often trying to catch up. Now that digital technology has found its way into manufacturing, energy, transportation, finance, and other sectors, and even into our day-to-day lives, a cyberincident has the potential to cause large-scale damage. Playing catch-up is not an option any more.

The classic approach to this problem is to apply external protections to an inherently insecure system. An alternative is to deploy systems that are secure by design, that is, have a reduced attack surface and prevent attacks from spreading across the infrastructure.

For a closer look at implementation of these systems, check out the series by Kaspersky security analysts Alexey Matyushin and Ekaterina Rudina. They are both working on the Cyber Immune approach and designing national standards for internet of things systems.

Read articles

  1. Security challenges of modern cybersystems
  2. Constructive information security – Security by Design
  3. Process requirements: Security objectives and threat modeling
  4. Process requirements: Creating an architecture and verifying code quality
  5. Requirements for architecture and design: Isolation and control
  6. Requirements for architecture and design: Cyber Immune integrity model
  7. Requirements for architecture and design: Minimizing the TCB
  8. The strengths of Cyber Immune systems and associated development costs