Category Archives: Laws

UK’s long-awaited device security law kicks in

UK Tightens Grip on Device Security with New Law

In an era where cyber threats are increasingly pervasive and sophisticated, the UK has taken a significant step towards bolstering its digital defenses with the enforcement of a long-anticipated device security law. This legislation, part of the broader initiative to enhance cybersecurity for consumers, aims to protect individuals and households from cyberattacks and vulnerabilities associated with connected devices.Consumers and businesses in the UK can now expect a higher level of protection from data breaches and cyberattacks, thanks to the recently implemented Product Security and Telecommunications Infrastructure (PSTI) Act 2022. This long-awaited legislation places new legal responsibilities on manufacturers of electronic devices and smart home products.

i. The Genesis of the Device Security Law

The rapid proliferation of Internet of Things (IoT) devices, ranging from smart thermostats and cameras to fitness trackers and home assistants, has inadvertently expanded the attack surface for cybercriminals. A report from 2021 estimated that there were over 25 billion connected devices worldwide, a figure expected to grow exponentially. This explosion in connected devices has outpaced the development of robust security measures, leaving consumers vulnerable to hacks, data breaches, and other cyber threats. 

The UK government recognized the pressing need to address these vulnerabilities, spurred by incidents of compromised devices leading to significant financial and privacy repercussions for individuals and businesses alike. 

The PSTI Act, which has been meticulously crafted in consultation with industry experts and stakeholders, aims to establish a baseline of security standards for consumer IoT devices sold in the UK. The result is a law that holds manufacturers, importers, and distributors accountable for the security of their products. The legislation mandates stringent security requirements to ensure that devices sold in the UK meet defined standards of cybersecurity.

ii. What does the PSTI Act do?

The PSTI Act aims to address the growing security concerns surrounding internet-connected devices. These devices, from smartphones and laptops to smart TVs and thermostats, can often contain vulnerabilities that hackers can exploit to steal data, disrupt operations, or launch malware attacks.

The Act mandates that manufacturers:

  • Implement minimum security measures in their devices, including robust password requirements, timely software updates, and clear end-of-life support policies.
  • Be transparent about the security features of their products and clearly communicate any known vulnerabilities.
  • Report serious security flaws to the authorities promptly.

iii. Benefits for Consumers and Businesses

The PSTI Act is expected to bring several benefits for consumers and businesses alike:

  • Enhanced Security: By requiring manufacturers to prioritize security features, the Act aims to create a safer digital environment for everyone. Consumers can be more confident that their devices are less susceptible to hacking attempts.
  • Reduced Risk of Data Breaches: Stronger security measures can help prevent data breaches, protecting sensitive personal and financial information.
  • Improved Transparency: The Act encourages manufacturers to be more transparent about the security of their products, allowing consumers to make informed choices.
  • Level Playing Field: The Act establishes a level playing field for manufacturers by setting clear and consistent security standards.

iv. Challenges and Considerations

While the PSTI Act is a positive step towards improving device security, some challenges remain:

  • Enforcement: The effectiveness of the Act will depend on how well it’s enforced by the relevant authorities.
  • Global Scope: Cyber threats are often international in nature. Collaboration with other countries to implement similar regulations could be crucial.
  • Innovation: Finding the right balance between security and innovation is important to ensure that the Act doesn’t stifle progress in the tech industry.

v. The Road Ahead

Smart home iot internet of things comfort and security innovative technology concept isometric banner abstract vector illustration

The PSTI Act marks a significant step forward for the UK in its efforts to create a more secure digital landscape. As the law is implemented, it will be interesting to see its impact on the device security landscape and how it influences other countries to adopt similar measures.

vi. The Need for Device Security Legislation

As our reliance on smart devices continues to grow, so does the risk of cyberattacks. From smart TVs and home assistants to security cameras and connected appliances, these devices, while convenient, can be vulnerable entry points for hackers. The lack of stringent security measures in many consumer devices has led to numerous breaches, causing financial losses and compromising personal data.

Recognizing these risks, the UK government has taken a proactive step to mitigate potential threats by implementing this device security law. This legislation aims to protect consumers by ensuring that the devices they use meet minimum security standards.

vii. Key Provisions of the Device Security Law

Internet of things, domotics and smart home innovations, isometric network of connected devices and appliances

The new law introduces several critical requirements for manufacturers of consumer IoT devices:

A. Ban on Default Passwords: One of the most significant changes is the prohibition of default, easily guessable passwords. Manufacturers must ensure that devices come with unique passwords or require users to set their own upon first use. This measure aims to prevent the widespread issue of using factory-set passwords like “admin” or “password,” which are easy targets for cybercriminals.

B. Transparency of Vulnerabilities: The law mandates that manufacturers must provide a public point of contact to facilitate the reporting of security vulnerabilities. This provision is crucial for maintaining an open channel for researchers and users to report and discuss potential security issues.

C. Transparency on Security Updates: Manufacturers are now required to be transparent about how long a device will receive security updates. This information must be clearly provided to consumers at the point of sale, enabling them to make informed decisions about the longevity and security of their devices.

D. Contact Point for Vulnerability Reporting: Companies must establish a public point of contact for reporting vulnerabilities. This initiative encourages the timely identification and rectification of security issues, fostering a collaborative approach to cybersecurity.

E. User Education and Awareness: The legislation emphasizes the need for consumer awareness. Manufacturers must provide clear and accessible information regarding the installation, maintenance, and secure use of their devices.

viii. Implications for Manufacturers

For manufacturers, the new regulations mean a significant shift in how they design and market their products. Compliance with these standards is mandatory, and non-compliance could result in substantial fines and reputational damage. Companies must now invest in robust security measures throughout the product lifecycle, from development to post-market support.

This legislative push also drives innovation in the tech industry. Manufacturers are incentivized to develop more secure devices, leading to advancements in security technologies and practices. In the long run, this could position the UK as a leader in IoT security standards.

ix. Benefits for Consumers

Consumers stand to gain the most from this legislation. The requirement for unique passwords and regular security updates significantly reduces the risk of cyberattacks on personal devices. With clear information on the duration of security support, consumers can make better-informed purchasing decisions, prioritizing security in their choices.

Additionally, the ability to report vulnerabilities easily helps in quick identification and resolution of security flaws, ensuring that devices remain secure throughout their usable life.

x. Challenges and Future Directions

The UK’s device security law sets a benchmark for other countries grappling with similar cybersecurity challenges. As cyber threats evolve, continuous updates and enhancements to such regulations will be necessary. International collaboration and alignment on IoT security standards could further strengthen global cybersecurity efforts. 

While the PSTI Act represents a proactive step towards securing digital devices, challenges remain. 

The global nature of the IoT market means that coordinating international standards and enforcement efforts will be crucial. Additionally, as technology evolves, so too will the nature of cyber threats, necessitating continual updates and refinements to security frameworks.

The UK government has signaled its commitment to working with international partners to harmonize security standards and foster a collaborative approach to cybersecurity. Future iterations of the PSTI Act may also expand to cover a broader range of devices and address emerging threats.

xi. Conclusion

The UK’s device security law sets a precedent that could ripple across the globe, encouraging other nations to follow suit with similar legislation. As connected devices become ever more integral to our daily lives, ensuring their security is paramount. It is a proactive approach that empowers consumers, holds manufacturers accountable, and ultimately aims to create a safer digital environment for all. As the law takes effect, it will undoubtedly contribute to building a more secure and resilient cyber landscape in the UK and potentially beyond.

By setting high standards for device security, the UK is not only protecting its consumers but also driving the tech industry towards a more secure future. As other nations observe the outcomes of this legislation, it is likely to inspire similar measures worldwide, collectively enhancing global cybersecurity.

xii. Further references 

UK’s long-awaited device security law kicks inComputer Weeklyhttps://www.computerweekly.com › news › UKs-long-a…

UK’s long-awaited device security law kicks inLinkedIn · Bistech plc10+ reactions  ·  3 weeks ago

NCC Group’s PostLinkedIn · NCC Group10+ reactions  ·  3 weeks ago

Dejan KosuticX · Dejan_Kosutic1 like  ·  3 weeks ago

UK’s long-awaited device security law kicks inProfessor Kevin Curranhttps://kevincurran.org › security › uks-long-awaited-d…

IoT GuideXhttps://twitter.com › iotguide › status

UK’s long-awaited device security law kicks inPC Help Forumhttps://pchelpforum.net › News › Tech News

UK cracks down on default passwords for smart devicesSC Mediahttps://www.scmagazine.com › Network Security

Navigating the new UK IoT legislationBCS, The Chartered Institute for IThttps://www.bcs.org › articles-opinion-and-research › na…

NCC Group today launched a new cyber policy …LinkedIn · NCC Group30+ reactions

Data Privacy Laws: GDPR versus US Data Privacy Laws

Navigating the Maze: Comparing GDPR and US Data Privacy Laws

Data privacy has become a paramount concern worldwide, prompting different regions to develop their own legal frameworks to protect individual privacy rights. 

Data privacy regulations are rapidly evolving worldwide, creating a complex landscape for businesses operating across borders. Understanding the key differences between the General Data Protection Regulation (GDPR), implemented in the European Union (EU), and the patchwork of US data privacy laws is crucial for ensuring compliance and protecting user data.

i. Scope and Applicability:

o GDPR: Applies to all companies operating within the EU and the European Economic Area (EEA), as well as to non-EU companies that offer goods or services to customers or businesses in the EU. GDPR protects the personal data of EU citizens regardless of where the processing occurs.

o US Data Privacy Laws: The US does not have a single, comprehensive federal law like GDPR. Instead, it has a patchwork of state-specific laws, such as the California Consumer Privacy Act (CCPA), along with sector-specific federal laws, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare. These laws vary significantly in scope and applicability.

ii. Rights of Individuals:

o GDPR: Grants extensive rights to individuals, including the right to be informed, the right of access, the right to rectification, the right to erasure (“right to be forgotten”), the right to restrict processing, the right to data portability, the right to object, and rights in relation to automated decision making and profiling.

o US: Lacks a comprehensive federal law like GDPR. Data privacy regulations vary by state, with California Consumer Privacy Act (CCPA) and Virginia Consumer Data Protection Act (VCDPA) being notable examples. These laws generally apply to businesses exceeding specific revenue thresholds or handling data of a certain number of California or Virginia residents, respectively.

iii. Data Protection Officer (DPO):

o GDPR: Requires certain organizations to appoint a Data Protection Officer (DPO) to oversee GDPR compliance.

o US Data Privacy Laws: Generally, there is no broad requirement for businesses to appoint a DPO. However, certain sector-specific regulations may require something similar. 

iv. Consent and Legitimate Basis:

o GDPR: Requires explicit and informed consent from individuals for most data processing activities. Exceptions exist for specific legal bases like fulfilling contracts or legitimate interests.

o US: Consent requirements vary by state. CCPA requires opt-out consent for the sale of personal information, while VCDPA necessitates opt-in consent for targeted advertising. Other legitimate interests may be recognized depending on the specific law.

v. Data Breach Notification:

o GDPR: A data breach must be reported to the regulatory authority within 72 hours of the organization becoming aware of it, and to the affected individuals if the breach likely results in a high risk to their rights and freedoms.

o US Data Privacy Laws: There is no uniform federal standard; however, all 50 states have laws that require entities to notify individuals of data breaches involving personally identifiable information. Timeframes and definitions of a reportable breach vary.

vi. Enforcement and Penalties:

o GDPR: Can impose fines up to €20 million or 4% of the firm’s annual worldwide revenue of the previous financial year, whichever is higher.

o US Data Privacy Laws: Penalties vary by law and state. For example, penalties under the CCPA are up to $7,500 per violation for intentional violations and $2,500 per violation for unintentional violations, plus a private right of action for certain unauthorized access, theft, or disclosure of personal information.

vii. Key Similarities:

o Both GDPR and US data privacy laws emphasize transparency and accountability in data handling practices.

o Both require organizations to implement appropriate security measures to protect personal data.

viii. Key Differences:

o GDPR has broader scope and stricter requirements compared to most US state laws.

o Consent requirements and individual rights differ significantly between GDPR and US regulations.

o Enforcement mechanisms and penalties vary considerably across jurisdictions.

ix. Navigating the Complexities:

o Organizations operating globally must comply with a patchwork of regulations, requiring careful analysis of applicable laws and implementation of tailored data privacy practices.

o Consulting with legal professionals and data privacy experts is crucial to ensure compliance and avoid potential penalties.

x. Conclusion 

In conclusion, while both GDPR and US data privacy laws aim to protect personal data, GDPR is generally more stringent, with broader applicability and more defined individual rights. 

The US approach is more fragmented and varies by state and sector. As data privacy continues to evolve, it’s possible these differences might narrow, especially if a federal privacy law is enacted in the US.

Understanding the nuances of GDPR and US data privacy laws is essential for businesses operating in the current digital landscape. By staying informed about evolving regulations and adopting robust data privacy practices, organizations can build trust with users and safeguard sensitive information.

xi. Further references 

SponsoredOsanohttps://www.osano.comUS Data Privacy Laws Guide – 2024 Guide to Compliance – U.S. Data Privacy Laws

SponsoredArbour Grouphttps://www.arbourgroup.comData and GDPR: Safeguarded – 2023 New Privacy Laws – Data Integrity and GDPR

Sponsoredintegritum.comhttps://www.integritum.com › data_privacy › solutionsRegulatory Compliance – Data Privacy Security – Ongoing Support & Guidance

GDPR US equivalent: How the US and EU compare on data privacy laws – Thoropass

Bloomberg Lawhttps://pro.bloomberglaw.com › pri…Comparing US State Data Privacy Laws vs. the EU’s GDPR

Endpoint Protectorhttps://www.endpointprotector.com › …EU vs US: What Are the Differences Between Their Data Privacy Laws?

IT Governance USAhttps://www.itgovernanceusa.com › …Are U.S. Data Privacy Laws So Different from the GDPR After All?

PECB Insightshttps://insights.pecb.com › data-priv…GDPR vs US Data Privacy Laws – PECB Insights

CyBOK’s Law & Regulation Knowledge Area

The Law & Regulation Knowledge Area (KA) within the CyBOK framework addresses legal and regulatory aspects of cybersecurity. 

i. A snapshot of key topics relevant to cybersecurity practitioners, aiming to

A. Identify common legal and regulatory risks associated with various cybersecurity activities.

B. Highlight potential sources of legal authority and scholarship.

C. Serve as a starting point for further exploration of specific legal and regulatory issues.

ii. Target Audience

A. Cybersecurity practitioners with no formal legal background.

B. Multinational audience, considering the diverse legal and regulatory landscape globally.

iii. Key Topics

A. International and national laws and regulations impacting cybersecurity, including data protection and emerging cyber warfare doctrines.

B. Compliance obligations for organizations operating in the digital world.

C. Security ethics and considerations related to data privacy, cybercrime, and offensive operations.

D. Legal aspects of specific cybersecurity activities such as:

    o Security management and risk assessment.

    o Security testing and incident response.

    o Forensic investigations and cyber operations.

    o Research, product development, and service delivery.

iv. Outline of domains covered under the Law & Regulation Knowledge Area

A. Cybercrime Legislation: National and international laws that define and punish unauthorized access, interception, interference, and misuse of computers, networks, and data.

B. Data Protection and Privacy Laws: Frameworks that govern the collection, use, and disclosure of personal information by organizations, including regulations such as the General Data Protection Regulation (GDPR) in the EU.

C. Intellectual Property Rights: Laws that protect creations of the mind, like software and databases, including copyrights, patents, and trade secrets.

D. Regulatory Compliance: Requirements imposed by government regulations specific to industries that mandate cybersecurity measures, such as the Health Insurance Portability and Accountability Act (HIPAA) or the Payment Card Industry Data Security Standard (PCI DSS).

E. International Law: Rules and principles that govern the relations between nations, including aspects related to cyber warfare, cyber espionage, and state-sponsored cyber attacks.

F. Jurisdictional Challenges: Issues related to jurisdiction in cyberspace, which includes questions about where and how legal actions can be pursued when a cyber incident crosses geographic and jurisdictional boundaries.

G. Incident Response and Reporting Requirements: Laws that relate to the responsibilities of organizations in responding to and reporting cybersecurity incidents.

H. E-Discovery and Digital Evidence: Legal issues surrounding the identification, collection, and preservation of digital evidence for use in legal proceedings.

I. Consumer Protection: Regulations aimed at safeguarding consumers from unfair or fraudulent business practices online.

v. Key Aspects of the Law & Regulation Knowledge Area

A. Legal and Regulatory Frameworks:

   o Aspect: Understanding national and international laws and regulations relevant to cybersecurity.

   o Objective: Guides organizations in complying with legal requirements and avoiding legal consequences.

B. Data Protection Laws:

   o Aspect: Understanding and complying with data protection and privacy laws.

   o Objective: Ensures proper handling of sensitive information and protects individuals’ privacy.

C. Intellectual Property Laws:

   o Aspect: Understanding laws related to the protection of intellectual property in the context of cybersecurity.

   o Objective: Protects organizations’ intellectual assets and fosters innovation.

D. Cybercrime Laws:

   o Aspect: Familiarity with laws addressing cybercrimes and computer-related offenses.

   o Objective: Facilitates the prosecution of cybercriminals and provides a legal basis for cybersecurity actions.

E. Incident Response and Reporting Obligations:

   o Aspect: Understanding legal requirements for incident response and reporting cybersecurity incidents.

   o Objective: Ensures organizations comply with reporting obligations and minimizes legal risks.

F. Electronic Evidence and Forensics:

   o Aspect: Legal considerations related to the collection and presentation of electronic evidence.

   o Objective: Supports legal actions and investigations related to cybersecurity incidents.

G. Cross-Border Legal Issues:

   o Aspect: Addressing legal challenges in cross-border data flows and international cooperation on cybersecurity matters.

   o Objective: Navigating legal complexities when cybersecurity incidents involve multiple jurisdictions.

H. Regulatory Compliance Frameworks:

   o Aspect: Compliance with industry-specific regulatory frameworks (e.g., financial, healthcare) impacting cybersecurity.

   o Objective: Ensures organizations meet sector-specific cybersecurity requirements.

I. Contractual and Liability Issues:

   o Aspect: Understanding legal aspects of cybersecurity contracts, liabilities, and indemnities.

   o Objective: Clarifies legal responsibilities and consequences in contractual agreements.

J. Government Regulations and Standards:

    o Aspect: Adherence to government-issued regulations and industry standards.

    o Objective: Establishes a baseline for cybersecurity practices and compliance.

K. Legal Implications of Emerging Technologies:

    o Aspect: Considering legal aspects related to emerging technologies (e.g., AI, IoT) in cybersecurity.

    o Objective: Addresses legal challenges arising from the adoption of new technologies.

L. Privacy by Design and Legal Compliance:

    o Aspect: Integrating privacy by design principles into cybersecurity practices to ensure legal compliance.

    o Objective: Aligns cybersecurity efforts with privacy laws and regulations.

vi. Resources

A. CyBOK Law & Regulation Knowledge Area Version 1.0.2: [https://www.cybok.org/media/downloads/Law__Regulation_issue_1.0.pdf](https://www.cybok.org/media/downloads/Law__Regulation_issue_1.0.pdf)

B. Introduction to CyBOK Knowledge Area Version 1.1.0: [https://www.cybok.org/knowledgebase/](https://www.cybok.org/knowledgebase/)

C. The Cyber Security Body of Knowledge v1.1: [https://www.cybok.org/knowledgebase/](https://www.cybok.org/knowledgebase/)

vii. Additional Notes

A. The CyBOK Law & Regulation KA is a continuously evolving resource.

B. It is important to stay updated on the latest legal and regulatory developments impacting cybersecurity.

C. Cybersecurity professionals should consider incorporating legal and regulatory considerations into their daily practice.

CyBOK’s approach to encapsulating this knowledge ensures that those working in cybersecurity are aware of the legal context in which they operate, ensuring compliance and helping to inform policy decisions. 

It is crucial for cybersecurity professionals to have an understanding of these legal aspects as they have direct implications on the design, implementation, and operation of secure systems. 

This knowledge area aims to bridge the gap between the technical aspects of cybersecurity and the legal implications of digital phenomena.

https://ceur-ws.org/Vol-2656/paper11.pdf

https://www.audacy.com/podcast/cybok-the-cybersecurity-body-of-knowledge-978d8/episodes

Understanding the Fundamental Laws of Cybersecurity Risk Management

Some fundamental principles, or “laws”, of cybersecurity risk:

A. Law of Complexity: The more complex a system, the harder it is to secure. Complex systems offer more potential points of infiltration for attackers.

B. Law of Constant Risk: No system is entirely secure. Every system, even the most modern and sophisticated, is at constant risk of cyber attacks and requires ongoing protection.

C. Law of Evolving Threats: Cyber threats are constantly evolving as technology progresses. A security strategy must be adaptable and regularly updated to tackle these emerging threats.

D. Law of Exploitation: Given enough time and resources, any system vulnerability can and will be exploited by cybercriminals.

E. Law of Human Factor: The human element is consistently the most significant vulnerability in any cybersecurity framework. Regardless of technology advancements, human error or negligence can always lead to security breaches.

F. Law of Inevitability: Regardless of how robust your system’s security is, it’s not a question of ‘if’ a cyberattack will occur, but ‘when’.

G. Law of Insider Threat: Not all threats come from outside. Insiders (employees, vendors, etc.) can pose a serious risk, whether through malice or negligence.

H. Law of Internet Exposure: The more access points a system or network has to the internet, the greater the risk of a cybersecurity breach.

I. Law of Rapid Response: The efficiency and speed of detecting and resolving threats can make the difference between a minor incident and a major breach.

J. Law of Risk Transference: You can outsource many things, but not responsibility. Even if you outsource your data handling, you’re still responsible for its security.

K. Law of Risk vs Reward: The level of security measures taken should be proportionate to the potential damage a breach could cause. The consequences of not securing valuable data far outweigh the costs of implementing security measures.

L. Law of Speed: The faster a vulnerability is detected and patched, the less likely it becomes that an attacker will exploit it.

M. Law of Technology Limitation: Technology alone cannot fully protect a system from cybersecurity risks. A comprehensive approach including people, processes, and technology is required.

N. Law of Vulnerability: There is no completely secure system. Every system has vulnerabilities, and it’s a matter of time before a malicious party exploits them.

Each of these “laws” emphasizes the need for robust, continuous approaches to managing cybersecurity risk. 

Each law underlines the need for a proactive, ongoing strategy for managing cybersecurity risk, as well as the inclusion of every aspect of an organization, from individuals to processes, in this strategy.

https://www.cybernx.com/b-10-laws-of-cyber-security-risks

https://www.linkedin.com/pulse/10-laws-cybersecurity-risk-you-cant?trk=public_post

https://www.knowledgehut.com/blog/security/principles-of-cyber-security

https://www.verizon.com/business/resources/articles/s/understanding-essential-cyber-security-principles/

https://www.pwc.co.uk/issues/cyber-security-services/insights/governing-cyber-security-risk.html

Certain immutable laws of cybersecurity

The original immutable laws of security (v2 updated below) identified key technical truths that busted prevalent security myths of those times. In that spirit, we’re publishing a new complementary set of laws focused on busting prevalent myths in today’s world of ubiquitous cybersecurity risk.

Since the original immutable laws, information security has grown from a technical discipline into a cybersecurity risk management discipline that includes cloud, IoT and OT devices. Now security is part of the fabric of our daily lives, business risk discussions, elections, and more.

As many of us in the industry followed this journey to a higher level of abstraction, we saw patterns of common myths, biases, and blind spots emerge at the risk management layer. We decided to create a new list of laws for cybersecurity risk while retaining the original laws (v2) as is (with a single slight change of “bad guy” to “bad actor” to be fully correct and inclusive).

Each set of laws deals with different aspects of cybersecurity – designing sound technical solutions vs. managing a risk profile of complex organizations in an ever-changing threat environment. The difference in the nature of these laws also illustrates the difficult nature of navigating cybersecurity in general; technical elements tend toward the absolute while risk is measured in likelihood and certainty. 

Some Laws of Cybersecurity Risk

A. Achieving Security Success Damages Attacker Profitability: Security can not deliver absolute safety, but it can discourage attackers by reducing their Return on Investment (ROI). Raise the cost for the attacker and diminish their returns related to your most critical assets.

B. Failing to Advance is Regressing: Security is an ongoing process, and staying idle means falling behind. The cost for attackers to control your assets is constantly reducing. Continually updating your security patches, strategies, risk awareness, inventory, tools, supervising systems, user rights models, and covering platforms are all vital to stay ahead.

C. Efficiency is the Ultimate Champion: If users find security complicated, they will try to bypass it to perform their tasks. Ensure that your solutions are both secure and user-friendly.

D. Attackers are Indifferent to the Techniques They Use for Infiltration: Attackers will exploit every vulnerability to access your system and assets, compromising anything from a networked printer to a cloud service or a PC. They could deceive a user, take advantage of insecure procedures, or simply ask for passwords via phishing emails. Your duty is to understand and eliminate the simplest, cheapest, and most beneficial options for them.

E. Ruthless Prioritization is a Necessity for Survival: There is never enough time or resources to mitigate all risks. Prioritize the assets most crucial to your organization, those attractive to attackers, and keep updating this prioritization.

F. Cybersecurity Requires Teamwork: It’s impossible for one entity to handle everything. Concentrate on tasks that are unique to you or your organization in order to protect its mission. If others can do certain tasks more efficiently or cost-effectively, let them do it.

G. Your Network May Not Be as Trustworthy as You Believe: Relying solely on password protection and trusting internal devices results in a security strategy that is barely better than not having one at all. Attackers can easily bypass such defenses, so the credibility of each device, user, and application must be constantly proven and confirmed, starting from a zero trust level.

H. Isolated Networks Aren’t Necessarily Secure: Air-gapped networks can potentially provide strong security if correctly maintained. However, if resources are important enough to be placed on an isolated network, ensure to invest in mitigations for possible connectivity such as USB media, bridges to internal networks, and external devices. 

I. Encryption Isn’t a Standalone Data Protection Measure: Encryption is effective against particular types of attacks, but data’s safety level is just as good as the security of the decryption key. 

J. Technology Cannot Rectify Problems Stemming from People and Processes: Techniques like machine learning, AI, and others can make substantial progress in security. However, cybersecurity is fundamentally a human problem and cannot be fully resolved by technology.

Each law underlines the need for a proactive, ongoing strategy for managing cybersecurity risk, as well as the inclusion of every aspect of an organization, from individuals to processes, in this strategy.

https://learn.microsoft.com/en-us/security/zero-trust/ten-laws-of-security

https://learn.microsoft.com/en-us/security/privileged-access-workstations/administration-videos-and-decks?source=recommendations

https://learn.microsoft.com/en-us/security/ciso-workshop/ciso-workshop-module-1?source=recommendations

https://www.linkedin.com/pulse/practical-examples-immutable-laws-security-ziggy-nemeth