EP 107: SDP 6: Fail-safe Defaults

EP 107: SDP 6: Fail-safe Defaults

Author: Kip Boyle October 13, 2023 Duration: 26:55

https://www.yourcyberpath.com/107/

In this episode, we go back to the Security Design Principles series, this time we are discussing Failsafe Defaults.

Failsafe defaults simply means that the default condition of a system should always be to deny.

An example of a failsafe default is the security reference monitor (SRM) that has been implemented in Windows operating systems since Windows NT. The SRM prevents access to any actions like logging on, accessing a file, or printing something unless the user presents a token to prove that they should have access to a file or an action.

There will always be two choices for failsafe defaults - to fail close or to fail open. The DoD and government organization side will tend toward using the fail close option, while the commercial and more streamlined companies will definitely prefer to fail open.

There will always be this challenge between security and operations. More security means less operations and more inconveniences, while prioritizing operations means that security will not be the best. It all depends on your organization and its goals.

Understanding failsafe defaults and other security design principles will help you become a better analyst and produce more secure, robust, and functional systems.

What You’ll Learn

●    What is Failsafe Defaults?

●    What are some examples for Failsafe defaults?

●     What is the Security Reference Monitor?

●     What is the difference between failing close and failing open?

Relevant Websites For This Episode

●    Akylade Certified Cyber Resilience Fundamentals (A/CCRF)

●   Your Cyber Path

●   IRRESISTIBLE: How to Land Your Dream Cybersecurity Position

●   The Cyber Risk Management Podcast

Other Relevant Episodes

●   Episode 103 - SDP 4: Compromise Recording

●   Episode 105 - SDB 5: Work Factor

●   Episode 101 -   SDP 3: Economy of Mechanism


Navigating a career in cybersecurity can feel like a maze without a clear map. Your Cyber Path: How to Get Your Dream Cybersecurity Job, hosted by Kip Boyle, cuts through the noise by focusing on the perspective of the people who actually make hiring decisions. This isn't just generic advice; it's a direct line to understanding what employers are truly looking for in candidates, from entry-level roles to advanced positions. Each episode delves into the practical, often unspoken, steps needed to build your skills, craft your resume, and ace interviews in this competitive field. You'll hear concrete strategies for bridging the gap between where you are now and that ideal job, all framed within the broader contexts of business, technology, and personal growth. Tune into this podcast for honest conversations that translate complex career pathways into actionable plans, helping you move forward with confidence. Whether you're considering a pivot or aiming to advance, the guidance here is rooted in real-world hiring dynamics, making it a valuable resource for anyone serious about building a future in cybersecurity.
Author: Language: English Episodes: 100

Your Cyber Path: How to Get Your Dream Cybersecurity Job
Podcast Episodes
EP 75: The Value of University Degrees in Cybersecurity [not-audio_url] [/not-audio_url]

Duration: 32:22
https://www.yourcyberpath.com/podcast/75/ In this episode, Kip and Jason talk about the value of university degrees in the cybersecurity career. This topic does come up all the time in discussions or when people come up…
EP 74: Top Five Mistakes People Make When Negotiating [not-audio_url] [/not-audio_url]

Duration: 44:56
https://www.yourcyberpath.com/74/ In this episode, the discussion between Kip and Jason is about the top five mistakes people are making when it comes to negotiating their pay. You need to know what mistakes to avoid whe…
EP 73: Top Five Things That Will Separate You From Other Applicants [not-audio_url] [/not-audio_url]

Duration: 36:27
https://www.yourcyberpath.com/73/ In this episode, the discussion between Kip and Jason is about the top five things that will make you stand out from other applicants. These tips will definitely help you get ahead of th…
EP 72: DISC Profiles [not-audio_url] [/not-audio_url]

Duration: 35:49
https://www.yourcyberpath.com/72/ In this episode, the discussion between Kip and Jason is about DISC profiles. You need to understand how important it is to choose the right job for you based on your personality. These…
EP 69: Breaking into Cybersecurity with Nancy Hunter [not-audio_url] [/not-audio_url]

Duration: 40:26
https://www.yourcyberpath.com/69/ In this episode, the focus of discussion is what Nancy Hunter, the Vice President, Chief Information Officer, and Data Privacy Officer of the Federal Reserve Bank of Philadelphia looks f…
EP 68: Can You Demonstrate Too Much Passion for Cybersecurity? [not-audio_url] [/not-audio_url]

Duration: 33:53
https://www.yourcyberpath.com/68 In this episode, Jason and Kip are focused on how you can demonstrate true passion for cybersecurity. They discuss the six things that you must avoid as they are considered red flags by a…
EP 66: How to Be Irresistible to Hiring Managers [not-audio_url] [/not-audio_url]

Duration: 42:31
https://www.yourcyberpath.com/66 In this episode, we are focused on how to make yourself into an irresistible candidate for hiring managers. Today, Naomi Buckwalter, another hiring manager, joins Kip and Jason. What do h…