article thumbnail

Comment: US Department of Defense Zero Trust Reference Architecture 2.0

Security Boulevard

of the US Department of Defence Zero Trust Reference Architecture has been cleared for public release and is a good, detailed read regarding an actual migration and implementation model. The document is available here. The post Comment: US Department of Defense Zero Trust Reference Architecture 2.0 Version 2.0

article thumbnail

The Architectural Mirror (Threat Model Thursdays)

Adam Shostack

I last discussed this in “ Architectural Review and Threat Modeling “ ). Builders say problems with the system are setting their projects back by weeks or months…Soon after launch, the new system repeatedly stalled and permit documents appeared to go missing. ’ That’s human nature. “).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is 5G security? Explaining the security benefits and vulnerabilities of 5G architecture

CyberSecurity Insiders

Defining 5G security and architecture. According to the document, 5G’s trustworthiness is made possible by a set of security features that were built using system design principles applied with a risk-based mindset. Delving into the technical details of the 5G security architecture is beyond the scope of this article.

article thumbnail

Threat Model Thursday: Architectural Review and Threat Modeling

Adam Shostack

For Threat Model Thursday, I want to use current events here in Seattle as a prism through which we can look at technology architecture review. Let’s transition from the housing crisis here in Seattle to the architecture crisis that we face in technology. Seattle has a housing and homelessness crisis.

article thumbnail

Metadata Left in Security Agency PDFs

Schneier on Security

Really interesting research : “Exploitation and Sanitization of Hidden Data in PDF Files” Abstract: Organizations publish and share more and more electronic documents like PDF files. All these information can be exploited easily by attackers to footprint and later attack an organization.

article thumbnail

Play ransomware attack on Xplain exposed 65,000 files containing data relevant to the Swiss Federal Administration.

Security Affairs

million files, and 65,000 documents were classified by NCSC as data relevant to the Federal Administration. 278 Federal Administration’s files contained technical information, encompassing documentation on IT systems, software requirement documents, or architectural descriptions. ” continues the report.

article thumbnail

NSA Releases Guidance on Zero-Trust Architecture

Dark Reading

A new document provides guidance for businesses planning to implement a zero-trust system management strategy.