EP 113 - SDP 9 Least common Mechanism

EP 113 - SDP 9 Least common Mechanism

Author: Kip Boyle January 5, 2024 Duration: 13:43

In this episode, Kip and Jason cover the Security Design Principle of “Least Common Mechanism”.

The Lease Common Mechanism is the ninth security design principle and focuses on how you can best protect older, legacy systems in large organizations and within the government.

Security Design Principle #9 is a crucial concept in the field of cybersecurity. It advocates for minimizing the amount of mechanisms shared by different users or processes, thereby reducing the chances of a security breach. This principle is rooted in the idea that shared resources or functionalities can become potential vulnerabilities, especially if they are used by multiple entities with varying levels of trustworthiness.

The principle is based on the understanding that any shared mechanism or resource is a potential attack surface. When different programs or users rely on the same functionality or data paths, a breach in one can easily become a gateway to compromise the others. For instance, if a shared library has a vulnerability, every program using that library is at risk. Therefore, by reducing the number of shared components, the principle of Least Common Mechanism aims to limit the potential damage that can be caused by a security flaw or breach.

Implementing this principle involves designing systems where the functionalities are as isolated as possible. This can be achieved through techniques like sandboxing, where programs run in isolated environments, or through the use of microservices architectures, where applications are broken down into smaller, independent services. Each service or program having its unique mechanisms greatly diminishes the risk of a widespread security incident.

The principle also underlines the importance of not only securing shared resources but also constantly monitoring them. Regular audits and updates of shared components are vital to ensure they remain secure. In essence, the Least Common Mechanism principle is about understanding the risks associated with shared resources and proactively designing systems to minimize these risks.

Relevant websites for this episode

Other Relevant Episodes

  • Episode 96 – SDP 1 – Least Privilege
  • Episode 98 – SDP 2 – Psychological Acceptability
  • Episode 101 – SDP 3 – Economy of Mechanism
  • Episode 103 – SDP 4 – Compromise Recording
  • Episode 105 – SDP 5 – Work Factor
  • Episode 107 – SDP 6 – Failsafe Defaults
  • Episode 109 – SDP 7 – Complete Mediation
  • Episode 111 - SDP 8 – Open Design

Navigating a career in cybersecurity can feel like a maze without a clear map. Your Cyber Path: How to Get Your Dream Cybersecurity Job, hosted by Kip Boyle, cuts through the noise by focusing on the perspective of the people who actually make hiring decisions. This isn't just generic advice; it's a direct line to understanding what employers are truly looking for in candidates, from entry-level roles to advanced positions. Each episode delves into the practical, often unspoken, steps needed to build your skills, craft your resume, and ace interviews in this competitive field. You'll hear concrete strategies for bridging the gap between where you are now and that ideal job, all framed within the broader contexts of business, technology, and personal growth. Tune into this podcast for honest conversations that translate complex career pathways into actionable plans, helping you move forward with confidence. Whether you're considering a pivot or aiming to advance, the guidance here is rooted in real-world hiring dynamics, making it a valuable resource for anyone serious about building a future in cybersecurity.
Author: Language: English Episodes: 100

Your Cyber Path: How to Get Your Dream Cybersecurity Job
Podcast Episodes
EP 95: The Cybersecurity Student Perspective with Sam Bodine [not-audio_url] [/not-audio_url]

Duration: 44:49
https://www.yourcyberpath.com/95/ In the beginning, our hosts Jason Dion and Kip Boyle talk a little bit about their new company Akylade, which is going to provide affordable cybersecurity training. They discuss their in…
EP 94: Ten Security Design Principles (SDP) [not-audio_url] [/not-audio_url]

Duration: 33:10
https://www.yourcyberpath.com/94/ To start off this episode, our hosts go on a short chat about ChatGPT and how it can be useful for cybersecurity professionals and job hunters. They also highlight the difference between…
EP 93: CyberWIDE Panel - LevelUp - InfoSec Certifications Soup [not-audio_url] [/not-audio_url]

Duration: 1:27:52
https://www.yourcyberpath.com/93/ In this special episode, we are going to share with you a live webinar hosted by the North Texas Information Systems Security Association. They invited our own Jason Dion and Kip Boyle f…
EP 92:  Password Managers [not-audio_url] [/not-audio_url]

Duration: 34:11
https://www.yourcyberpath.com/92/ In this short episode, our hosts Jason Dion and Kip Boyle discuss the critically important topic of password managers. In the beginning, Jason quickly describes password managers, their…
EP 91: Mobile Device Security  with Haseeb Awan [not-audio_url] [/not-audio_url]

Duration: 38:09
https://www.yourcyberpath.com/91/ Haseeb Awan is the Founder & CEO at EFANI Secure Mobile. In this episode, we'll hear about Haseeb's cyber path, and we'll explore some of the biggest mobile phone risks and what you can…
EP 90: How to Get Your First Job as a Pentester with Chris Horner [not-audio_url] [/not-audio_url]

Duration: 36:09
https://www.yourcyberpath.com/90/ In this episode our host Jason Dion goes over the very exciting topic of how to get your first job as a Pentester with Chris Horner, banking expert turned Security engineer and Penetrati…
EP 89: Getting My First Job in Cybersecurity with Ayub Yusuf [not-audio_url] [/not-audio_url]

Duration: 30:01
https://www.yourcyberpath.com/89/ In this episode our host, Jason, interviews Ayub (@WhiteCyberDuck) about how he got into the Cybersecurity industry This time we go over a very common case where people tend to study som…
EP 88: The CIA Triad - The Basis of Cybersecurity (Authentication) [not-audio_url] [/not-audio_url]

Duration: 37:12
https://www.yourcyberpath.com/88/ In this episode we arrive at the end of our five-part series talking about the CIA NA Pentagram, this time discussing the last pillar, Authentication. Authentication is always associated…
EP 87: The CIA Triad - The Basis of Cybersecurity (Nonrepudiation) [not-audio_url] [/not-audio_url]

Duration: 25:19
https://www.yourcyberpath.com/87/ In the fourth video of this five-part series discussing the CIA-NA pentagram, Kips and Jason talk about nonrepudiation. In simple terms, nonrepudiation means you can't say you didn't do…
EP 86: The CIA Triad - The Basis of Cybersecurity (Availability) [not-audio_url] [/not-audio_url]

Duration: 42:17
https://www.yourcyberpath.com/86/ In this episode, Kip and Jason discuss everything that makes the A in the CIA Triad, Availability. Availability is when you like to use a system and it's there ready for you to use, beca…