CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Secure by Design principles applied to IT infrastructure

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

The Cybersecurity and Infrastructure Security Agency (CISA) has released the Secure by Design framework, emphasizing the importance of integrating security into every stage of IT infrastructure development and maintenance. This approach aims to address the increasing complexity and vulnerability of hybrid and cloud environments, which have become prime targets for cyberattacks. The framework advocates for a proactive, flexible, and continuous security management process, moving away from traditional, reactive measures. It highlights the need for collaboration across all enterprise functions to embed security at every step of infrastructure building, provisioning, operation, and maintenance. The Secure by Design framework is designed to help organizations close security gaps, reduce exposure to cyber threats, and ensure that security is not an afterthought but a fundamental part of IT infrastructure.

Timeline

  1. 15.09.2025 17:00 1 articles · 17d ago

    CISA releases Secure by Design framework for IT infrastructure

    The Cybersecurity and Infrastructure Security Agency (CISA) has released the Secure by Design framework, which emphasizes the importance of integrating security into every stage of IT infrastructure development and maintenance. This framework aims to address the increasing complexity and vulnerability of hybrid and cloud environments, which have become prime targets for cyberattacks. It advocates for a proactive, flexible, and continuous security management process, moving away from traditional, reactive measures. The framework highlights the need for collaboration across all enterprise functions to embed security at every step of infrastructure building, provisioning, operation, and maintenance.

    Show sources

Information Snippets

  • The Secure by Design framework by CISA aims to integrate security into every stage of IT infrastructure development and maintenance.

    First reported: 15.09.2025 17:00
    1 source, 1 article
    Show sources
  • Hybrid and cloud environments have increased the complexity and vulnerability of IT infrastructure, making them prime targets for cyberattacks.

    First reported: 15.09.2025 17:00
    1 source, 1 article
    Show sources
  • The framework emphasizes the need for collaboration across all enterprise functions to embed security at every step of infrastructure building, provisioning, operation, and maintenance.

    First reported: 15.09.2025 17:00
    1 source, 1 article
    Show sources
  • The Secure by Design framework advocates for a proactive, flexible, and continuous security management process.

    First reported: 15.09.2025 17:00
    1 source, 1 article
    Show sources
  • The framework aims to close security gaps, reduce exposure to cyber threats, and ensure that security is a fundamental part of IT infrastructure.

    First reported: 15.09.2025 17:00
    1 source, 1 article
    Show sources
  • The framework is designed to help organizations shift security left, integrating it as early as possible in the infrastructure development process.

    First reported: 15.09.2025 17:00
    1 source, 1 article
    Show sources

Similar Happenings

GitHub Strengthens npm Supply Chain Security with 2FA and Short-Lived Tokens

GitHub is implementing enhanced security measures to protect the npm ecosystem, including mandatory two-factor authentication (2FA) and short-lived tokens. These changes aim to mitigate supply chain attacks, such as the recent "s1ngularity", "GhostAction", and "Shai-Hulud" attacks, which involved a self-replicating worm and compromised thousands of accounts and private repositories. The measures include granular tokens with a seven-day expiration, trusted publishing using OpenID Connect (OIDC), and automatic generation of provenance attestations for packages. Additionally, GitHub is deprecating legacy tokens and TOTP 2FA, expanding trusted publishing options, and gradually rolling out these changes to minimize disruption. GitHub removed over 500 compromised packages and blocked new packages containing the Shai-Hulud malware's indicators of compromise. The company encourages NPM maintainers to use NPM-trusted publishing and strengthen publishing settings to require 2FA. Ruby Central is also tightening governance of the RubyGems package manager to improve supply-chain protections.

SIEM Detection Failures Highlighted in Picus Blue Report 2025

The Picus Blue Report 2025, based on over 160 million attack simulations, reveals that organizations detect only 1 out of 7 simulated attacks. This indicates significant gaps in threat detection and response capabilities, primarily due to log collection failures, misconfigured detection rules, and performance issues. These failures leave networks vulnerable to compromise, escalation of privileges, and data exfiltration. The report identifies key issues such as log source coalescing, unavailable log sources, and inefficient filtering as major contributors to SIEM rule failures. Continuous validation of SIEM rules is essential to maintain effectiveness against evolving threats. The report also shows that prevention dropped from 69% to 62% in one year, and that 54% of attacker behaviors generated no logs, making entire attack chains unfold with zero visibility. Only 14% of attacker behaviors triggered alerts, and data exfiltration was stopped just 3% of the time, leaving a critical stage effectively unprotected. The report highlights the need for Breach and Attack Simulation (BAS) to validate security defenses continuously.