Closed Josh-Beck closed 8 months ago
I think this is a good idea. @mackowski @jmanico @kwwall what do you think?
@Josh-Beck I'm curious about this line:
Trust boundaries - Not zero trust. Explain how should architectures handle trust and how much trust should be given.
Why did you choose that?
@Josh-Beck I'm curious about this line:
Trust boundaries - Not zero trust. Explain how should architectures handle trust and how much trust should be given.
Why did you choose that?
Two reasons behind this statement:
First, I'd like to avoid too much mention or elaboration on Zero Trust in this cheat sheet, due to its complexity and divergence from the topic.
Second, often architectures have implicit trust of certain resources within certain boundaries. As an example, downstream elements may not validate the integrity and authenticity of a JWT token if an API Gateway layer does. Depending on risk this can be acceptable, but trust boundaries should be made explicit to outline this trust.
Does this answer your question?
What is the proposed Cheat Sheet about?
I propose a cheat sheet that outlines how to create and/or review a software architecture with a security mindset. This may draw from or reference the Threat Modeling, Attack Surface, and Microservices Arch Doc cheat sheets, but I believe it is distinct. This cheat sheet would discuss frequently used technologies and common pitfalls that occur with cloud architectures.
(This would be a cloud focused cheat sheet, as that is where my experience lies.)
What security issues are commonly encountered related to this area?
What is the objective of the Cheat Sheet?
The cheatsheet would likely outline the following elements (open to subtractions and additions):
What other resources exist in this area?