Women In Security Magazine Issue 13

Page 88

GINA MIHAJLOVSKA

WHY ZERO TRUST NEEDS SYSTEMS ENGINEERING by Gina Mihajlovska, Cyber Security Manager at EY

The release of NIST publication 800-207 on Zero Trust

between technical and human-centred processes that

Architecture (ZTA) gave the cybersecurity community

have been developed to support the management of

the preliminary systems engineered processes to

engineering disciplines. It ensures all likely aspects of

deliver ZTA. These processes leverage know-how,

a project or system are considered and integrated into

developed over decades, on the design, integration and

a whole.

management of complex systems over their lifecycle. At its core, systems engineering uses systems thinking

NIST Special Publication 800-207 defines ZTA as new

principles to organise this body of knowledge. The

way of developing a security enterprise architecture.

outcome of such efforts is an engineered system

NIST white paper CSWP 20, Planning for a Zero

which combines components that work cooperatively

Trust Architecture: A Planning Guide for Federal

to collectively perform a useful function.

Administrators, focusses on the implementation of the cybersecurity principles to be applied to services

Systems engineering enables organisations to

and data flows. In 2020 NIST introduced an approach

successfully perform the many functions needed

for the implementation of ZTA to assist organisations

for successful system design, implementation

with the complexity of moving their technology and

and, ultimately, decommissioning: engineering,

operational environment from a security model based

reliability assessment, logistics, team coordination,

on protecting the perimeter to a zero-trust model.

testing and evaluation, designing for maintainability,

Implementation of this model requires systems

and many others.

engineering thinking. It enables organisations to thoughtfully and intelligently undertake the definition,

88

Systems engineering also permits the complexities

information capture and risk management of

and difficulties associated with the delivery of large

the complexities and difficulties encountered as

and/or complex projects to be managed successfully.

they transform their technology, resources and

Systems engineering uses work process optimisation

processes from perimeter protection security to

methods to deal with the, often significant, overlaps

zero‑trust security.

W O M E N I N S E C U R I T Y M A G A Z I N E

M A R C H • A P R I L 2023


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

ACCIDENTALLY IN CODE

2min
page 118

THE LEARNING HUB

17min
pages 108-117

THE LEARNING HUB

3min
pages 106-107

LISA ROTHFIELD-KIRSCHNER

2min
pages 102-103

STUDENT IN SECURITY SPOTLIGHT

16min
pages 94-101

WHY ZERO TRUST NEEDS SYSTEMS ENGINEERING

4min
pages 88-90, 92

ARE SOCS THE NEW BLACK?

3min
pages 86-88

Agreeing with your partner about how your child uses tech

2min
page 84

IN TIMES OF CONFLICT, WOMEN ARE STEPPING UP FOR THE CYBER FIGHT

6min
pages 80-84

LEADING EARLY: IDENTIFYING LEADERSHIP QUALITIES IN YOURSELF FOR A MORE FULFILLING CAREER IN SECURITY

4min
pages 78-79

SPOTTING AND REPORTING A SCAM

3min
pages 76-77

THE WEIGHT OF AUTHORITY

4min
pages 74-75

APAC NATIONS OFFERED FREE TRAINING TO COUNTER QUANTUM COMPUTING THREATS

1min
page 73

IS IT TIME FOR A PERSONAL C-I-A TRIAD?

4min
pages 70-72

“From little things big things grow”

1min
page 66

JOB BOARD

4min
pages 64-66

JOB BOARD

4min
pages 62-63

IT TAKES A GUIDING LIGHT TO FIND A WAY THROUGH THE DARKNESS

6min
pages 58-61

THE NONLINEAR ROAD TO CISO

3min
pages 56-57

FIVE HIGH PERFORMING HABITS TO HELP YOU REACH THE NEXT LEVEL OF BEST SELF

6min
pages 52-56

MENTORING IN 2023: CREATING THE ‘PERFECT PAIR’

4min
pages 48-50

Events

0
page 46

Let’s make 2023 a year to remember!

3min
pages 44-45

TALENT BOARD

4min
pages 40-43

TALENT BOARD

1min
pages 38-39

2023 NEW ZEALAND WOMEN IN SECURITY AWARDS

4min
pages 35-37

WHAT’S HER JOURNEY?

23min
pages 16-26, 28-34

All cybercrime victims are equal, but…

1min
page 14

DESPITE AMBITIONS FOR EQUALITY, SECURITY’S GENDER SPLIT IS STILL FALLING SHORT OF EXPECTATIONS

6min
pages 10-14

FROM THE PUBLISHER

3min
pages 2-5, 7
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.