Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Handle Security Threats by Default
Cybersecurity

How to Handle Security Threats by Default

Robert WoodBy Robert WoodOctober 26, 2022Updated:December 1, 20223 Mins Read
Facebook Twitter LinkedIn Email
secure defaults
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Building good software is hard. Building good software that’s also secure is even harder. Arguably, the very definition of “good software” is also software that’s secure, but security is just one of many qualities expected of software development teams and, more specifically, on engineers. This list is getting longer all the time: validate your input; remember the correct encoding context; don’t take dynamic input into your SQL (structured query language) queries; use security headers; update your libraries — to name just a few. It’s a nontrivial amount of cognitive overhead, which is where secure defaults can help.

How Secure Defaults Work

Secure defaults can make the packed life of a development team easier. Set up the system to work by default in a way that supports the outcome that you’re aiming for. This dynamic has been applied in many different capacities, including school lunch programs and 401k savings, building on principles from behavioral economics. Clint Gibler gave a fantastic talk on applying this principle and supporting it via build-time tests.

The pursuit of secure defaults can open conversations about technology stack selection. Programming languages, development frameworks, middleware, and various other tools have different advantages and disadvantages. There is no perfect tech stack. Every application has unique needs, a unique problem to solve, and a unique threat model. Yet teams must be intentional about the curation of their technology stack so that it works for them, handling key security needs by default. This is where layers come into the picture.

Secure Defaults Layers

There are numerous opportunities to create secure default dynamics. Building on my comment above about threat models, let’s first consider what classes of vulnerabilities are most important. For example, injection attacks may be quite prevalent, or maybe there are issues around authentication or cross-site request forgery; these insights could come from vulnerability data review, threat model analysis, or insights from adversarial exercises like penetration tests.

Secure defaults can be introduced at multiple points, depending on the capabilities of the technologies in use. Places worthy of investigation might include:

  • The programming languages directly (for example, Python being largely safe against memory corruption vulnerabilities like buffer overflows)
  • Within the development frameworks used
  • As part of features in extension libraries to the development frameworks
  • As configuration options associated with the infrastructure resources used in the operating environment (e.g., cloud services that can automatically handle encryption)
  • Within peripheral technologies used as part of the operating environment (e.g., WAFs (web application firewalls), middleware, key management, etc.)

The concept of secure defaults doesn’t have to be taken literally, and it doesn’t have to be a lot of work. With some engineering and creativity, it’s likely possible to create security controls that are applied automatically or as close to it as possible with little added effort. The goal is ultimately to reduce the development team’s cognitive overhead so they have one less thing to worry about in the journey to build secure products.

Concluding Thoughts

There are several ways to pursue a secure-by-default strategy, and there are also many different classes of vulnerabilities to tackle. Keeping the focus on the cognitive load that doing security work entails will keep developer experience in the foreground. If doing the secure thing is the easier thing, it’s much more likely that the outcome will be favorable for security teams down the line as well.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

authentication data featured infrastructure security software software development technology vulnerability
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Microsoft, Gong Detail How AI and Integration Partnership Drives Higher Sales Performance

June 24, 2025

AI Industrialization of America Rolls On as AWS Plans Data Centers in Coal Country

June 24, 2025

Snowflake to Acquire Crunchy Data to Power Agentic AI with PostgreSQL Integration

June 24, 2025

AWS Data Centers Opening in Coal Country: ‘AI-Industrialization’

June 24, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft, Gong Detail How AI and Integration Partnership Drives Higher Sales Performance
  • AI Industrialization of America Rolls On as AWS Plans Data Centers in Coal Country
  • Snowflake to Acquire Crunchy Data to Power Agentic AI with PostgreSQL Integration
  • AWS Data Centers Opening in Coal Country: ‘AI-Industrialization’
  • Larry Ellison Declares Oracle Will Be #1 in Cloud Databases, Apps, and AI Data Centers

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.