Cyber Security
Principles and Approaches
Principles and Approaches
In today’s digital landscape, organizations face increasing security threats that demand robust and proactive strategies. Secure by Design emphasizes integrating security from the very beginning of system development, ensuring that applications and infrastructure are inherently resistant to attacks. Least Privilege is a core principle that limits user and system access to only what is necessary for their roles, reducing the potential impact of breaches. Defense in Depth complements these approaches by implementing multiple layers of security controls, so that even if one layer is compromised, others continue to protect critical assets. Together, these approaches create a comprehensive security posture that balances prevention, mitigation, and resilience.
Definition:
A security strategy that uses multiple, layered controls at different points, so if one layer fails, others still protect you.
Use case:
Imagine that you have secured all the layers, except the database backup, and the hacker come to the location, and take copy from the backup, he can steal all sensitive data.
Key Practices
Physical Security: example, Locked server rooms, CCTV, guards
Network Security: example, Firewalls, IDS/IPS, VLAN segmentation
Endpoint Security: example, Antivirus, EDR (e.g., CrowdStrike, SentinelOne)
Application Security: example, Code reviews, WAFs, secure coding
Access Control: example, MFA, RBAC, Zero Trust
Data Security: example, Encryption (at rest & transit), DLP
Monitoring & Response: example, SIEM (Splunk, QRadar), SOC team
User Awareness: example, Phishing training, policies
The core zero-trust principle is: "Never Trust, Always Verify.", so even after authentication and authorization, keep continuous monitoring and verifying.
At this level, you consider the implementation of "Least Privileges".
To implement this principle, we should apply the following practices:
Integrate SAST tools at the pipeline, like SonarCloud
Automated Security Testing (OWASP ZAP, Burp Suite )
WAF as the umbrella for your solution, which detects the following:
XSS
Rate limiting
Anomaly detection
Injections
Block malicious payloads
Strong Authentication (OAuth 2.0, OpenID Connect, JWT)
MFA: Multi-factor authentication, authentication at first login
Implement Role-Based Access Control (RBAC) to prevent access to improper services
Encrypt payload
Use secret keys
Auto-Rotate secret keys
Use a secret key for each channel
Never expose the secret key in the front-end layer
Obfuscation of frontend
Add HSTS and XSS headers at the frontend
Add HSTS and XSS headers at the backend
Continuous authentication on core activities:
Payment
Asset transfer
Encrypt traffic
SSL
TLS 1.2 or higher
Prevent data crawling
Infrastructure security
API versioning deprecation model for old APIs
Users/systems get only the access they need
Developer can’t access production DB
NIST 800-53 (AC-6), CIS Controls v8
Firewall Matrixes
RBAC with API control limitations
In CNCF, Security by Design means building security controls into cloud-native systems from the start, rather than adding them later.
Key principles in the CNCF context:
Default secure configurations (e.g., minimal privileges, encrypted communications).
Shift-left security — integrating security checks into CI/CD pipelines early in development.
Isolation & sandboxing — using containers, namespaces, and network policies to limit blast radius.
Supply chain security — verifying container images, dependencies, and build pipelines (e.g., with Notary, Sigstore).
Runtime protection — monitoring for anomalies with tools like Falco.
Policy enforcement — applying rules automatically via OPA, Kyverno.
Secure service identity — using SPIFFE/SPIRE for workload authentication.
Enable CORS restrictions
Configure and implement CSRF tokens
Yes — CNCF’s Security by Design overlaps a lot with Zero Trust, but they’re not identical.
Similarities:
Never trust by default – every connection, workload, and user is verified.
Least privilege – minimal permissions for services and users.
Continuous verification – authentication/authorization at each request.
Micro-segmentation – limit lateral movement via network policies.
Differences:
Security by Design in CNCF is broader: covers secure coding, supply chain security, secure defaults, and runtime protections — not just access control.
Zero Trust is mainly a security model for identity, access, and network trust boundaries — often a subset of Security by Design.
So in practice:
Zero Trust = one core principle set inside CNCF’s larger Security by Design approach.
CNCF would use Zero Trust patterns plus other security practices across the whole development and operations lifecycle.
So, you should consider the following:
Integrate security from the start of the development lifecycle
Threat modeling in app design phase
OWASP SAMM, Secure SDLC
Secure every layer by concrete hardening process
Identify Critical Components
Map out which parts are mission-critical & their dependencies.
Use dependency diagrams / service maps.
Define SLAs & SLOs
Set expectations for what “acceptable degradation” looks like.
E.g., 95% requests succeed even if one DB node is down.
Design for Redundancy
Use replication, clusters, multi-AZ/multi-region deployments.
DB replicas, stateless services, load balancers.
Implement Graceful Degradation
Let the system operate with limited functionality.
Disable non-critical features when under strain.
Use Timeouts & Circuit Breakers
Detect & isolate failing components to protect the rest.
Hystrix, Resilience4j, Envoy circuit breakers.
Monitor & Detect Quickly
Add health checks, distributed tracing, alerts.
Prometheus, ELK, Datadog, OpenTelemetry.
Test Partial Failures
Chaos testing to simulate component failures & validate resilience.
Use Chaos Monkey, LitmusChaos, Gremlin.
Communicate Status
Show clear status/errors to users & fallback options.
“Read-only mode” or retry options.
Plan Recovery & Rollback
Automate failover & recovery processes.
Auto-healing with Kubernetes, disaster recovery drills.
Plan for high availability: HPA
Definition:
FIM is a system that allows users to use a single digital identity across multiple organizations or domains, without creating separate accounts for each.
Technically called SSO.
Fewer passwords to manage: Users log in once (SSO) → less password reuse & fewer weak passwords.
Stronger authentication at one place: MFA & policies enforced at the Identity Provider (IdP), not scattered across apps.
Centralized control & monitoring: Easier to revoke access, audit logins, and detect anomalies in one place.
Reduced attack surface: Apps don’t handle or store credentials → harder to steal them from every app.
Trusted tokens instead of passwords: Short-lived tokens (JWT/SAML) minimize the window for misuse.
A security management approach is the structured method an organization uses to plan, implement, monitor, and continuously improve how it protects information, systems, and operations from threats.
Will mention approach, Description, example, and related Best Practices / Standards, as following:
Risk-Based Approach
Focus on threats with the highest business impact
Prioritize patching exposed servers over internal apps
ISO 27005, NIST RMF
Segmentation
Divide systems/networks to limit breach impact
Separate the finance network from the guest Wi-Fi
PCI DSS, NIST CSF
Monitoring & Detection
Continuous logging and anomaly detection
SIEM alerts for failed logins or unusual traffic
MITRE ATT&CK, NIST 800-92
Patch Management
Timely updating of software and systems
Monthly OS/app updates, CVE patching
NIST 800-40, CIS Control 7
Awareness & Training
Educating users to recognize threats
Phishing simulation and response training
ISO 27001 A.7, NIST NICE Framework
Incident Response
Defined process to detect, respond, and recover from incidents
IR plan triggered during ransomware attack
NIST 800-61, ISO 27035
Common Frameworks for a Security Management Approach:
ISO/IEC 27001 – ISMS (Information Security Management System).
NIST Cybersecurity Framework – Identify, Protect, Detect, Respond, Recover.
COBIT – Governance of enterprise IT security.
Dr. Ghoniem Lawaty
Tech Evangelist @TechHuB Egypt