Breaking
June 5, 2025

Secure by design: the MOD’s honest take | usagoldmines.com

The Ministry of Defence (MOD) recently published a document on ‘Secure by Design’ challenges that represents something we rarely see in government cybersecurity: a transparent acknowledgment of the complexities involved in implementing security from first principles.

Secure by design is a fundamental approach that embeds security into systems from the very beginning of the design process as opposed to treating it as a bolt-on feature later in development.

Having spent years advocating for the human element in security, it’s refreshing to see an official recognition that technical controls are only as effective as the people implementing them.

Addressing the Security Skills Challenge

The MOD’s first identified problem is “How do we up-skill UK defense in ‘Secure by Design’?”

Their acknowledgment that effective implementation requires a “one team” approach across UK defense reflects the reality that security cannot be siloed within technical teams.

This aligns perfectly with what I’ve observed in organizations with mature security cultures—security becomes everyone’s responsibility, not just the security department’s concern.

The Knowledge Distribution Problem

Perhaps most intriguing is problem two: “How does ‘Secure by Design’ account for unevenly distributed information and knowledge?”

The MOD correctly identifies that information asymmetry exists for various legitimate reasons. What makes this assessment valuable is the recognition that not all information-sharing barriers stem from poor security culture; some exist by design and necessity.

Imagine a family planning a surprise birthday party for their grandmother. Different family members have different pieces of information that they intentionally don’t share with everyone:

The daughter knows the guest list and has sent invitations directly to each person, asking them not to discuss it openly on family group chats,

The son has arranged the venue and catering, with specific dietary requirements for certain guests,

The grandchildren are handling decorations and have a theme they’re working on,

And most importantly—nobody tells grandmother anything about any of this.

This isn’t because the family has poor communication skills or doesn’t trust each other. These information barriers exist by design and necessity to achieve the goal of surprising grandmother. If everyone shared everything with everyone else, the surprise would be ruined.

The MOD’s approach

In the MOD’s security context, this is similar to how:

Certain threat intelligence can’t be shared with all suppliers because doing so might reveal intelligence-gathering capabilities,

Suppliers can’t share all their proprietary technology details even with clients like the MOD, as they need to protect their competitive advantage,

Specific security controls might be kept confidential from general staff to prevent those controls from being circumvented.

These aren’t failures of security culture—they’re intentional compartmentalization that sometimes make security work possible in the first place. The challenge isn’t eliminating these barriers but designing systems that can function effectively despite them.

This reflects the nuanced reality of human behavior in security contexts. People don’t withhold security information solely due to territoriality or negligence; often, legitimate constraints prevent the ideal level of transparency. The challenge becomes developing systems and practices that can function effectively despite these inherent limitations.

The Early Design Challenge

The third problem addresses a familiar paradox: how to implement security at the earliest stages of capability acquisition when the capability itself is barely defined.

In other words, it’s like trying to build a high-tech security system for a house when you only have a rough sketch of what the house might eventually look like – you know you need protection, but it’s difficult to plan specific security measures when you’re still deciding how many doors and windows there will be, what valuables will be stored inside, or even where the house will be located. As the MOD puts it, at this stage a capability might be “little more than a single statement of user need.”

This connects directly to how humans approach risk management. When primary objectives (delivering military capability) compete with secondary concerns (security), practical compromises inevitably emerge. The MOD’s candid acknowledgment that “cyber security will always be a secondary goal” reflects a pragmatic understanding of how priorities function in complex organizations.

Through-Life Security

Problem four addresses perhaps the most demanding human aspect of security: maintaining security rationale and practice across decades of a capability’s lifespan. With defense platforms potentially remaining operational for 30+ years, today’s security decisions must make sense to tomorrow’s engineers.

The question of continuous risk management becomes particularly relevant as organizations encounter new threats over their extended lifespans. How human operators interpret and respond to evolving risk landscapes determines the long-term security posture of these systems.

Building a Collaborative Security Culture

The MOD recognizes that ‘Secure by Design’ implementation isn’t merely a technical challenge but fundamentally about collaboration among people across organizational, disciplinary, and national boundaries.

The MOD’s approach suggests a shift toward a more mature security culture — one that acknowledges limitations, seeks external expertise, and recognizes the complex interplay between human factors and technical controls. Their openness about needing help from academia and industry demonstrates a collaborative mindset essential for addressing complex security challenges.

This collaborative approach to security culture stands in stark contrast to the traditional government tendency toward self-sufficiency. By explicitly inviting external perspectives, the MOD demonstrates an understanding that diverse viewpoints strengthen security posture rather than compromising it.

Security isn’t about having all the answers—it’s about creating the conditions where people can collaboratively develop appropriate responses to ever-changing threats.

We’ve compiled a list of the best identity management software.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

​ 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

Disney’s free streaming ‘perks’ are just insulting | usagoldmines.com

Get these ultra-fast USB-C cables on sale, now 2 for only $12 | usagoldmines.com

Five Shows to Watch While You Wait for the Next Season of 'Hacks' Stephen Johnson | usagoldmines.com

Someone Built an AI Agent for the iPhone Before Apple Could David Nield | usagoldmines.com

iPhone Users Say Mail App Suddenly Showing Blank Screen on iOS 18.5 Joe Rossignol | usagoldmines.com

Amazon Takes Up to $65 Off 11th Gen iPad, Starting at $299 Mitchel Broussard | usagoldmines.com

Apple Arcade Adding Four More Games, Including Angry Birds Bounce Joe Rossignol | usagoldmines.com

More than 3 million records, 12TB of data exposed in major app builder breach | usagoldmines.com

Silent Hill f gets an official release date and a creepy PS5 gameplay trailer | usagoldmines.com

NYT Connections hints and answers for Friday, June 6 (game #726) | usagoldmines.com

NYT Strands hints and answers for Friday, June 6 (game #460) | usagoldmines.com

Quordle hints and answers for Friday, June 6 (game #1229) | usagoldmines.com

Can UK businesses balance AI ambitions with sustainability obligations? | usagoldmines.com

Your Amazon delivery person might soon be a robot, which isn't as terrible as it sounds lance.ulanof...

AI is growing up: how to guide it from experimental child to trusted enterprise adult | usagoldmine...

The best free VPNs: 5 no-cost top picks | usagoldmines.com

Want stronger online security? Think like Gen Z | usagoldmines.com

9 menial tasks ChatGPT can handle for you in seconds, saving hours | usagoldmines.com

Today’s best laptop deals: Save big on work, school, home use, and gaming | usagoldmines.com

This Anker docking station doubles as a monitor stand and it’s 20% off | usagoldmines.com

Alienware’s elegant wireless gaming mouse is down to its best-ever price | usagoldmines.com

This Tool for Runners Quickly Measures the Incline of Any Hill Beth Skwarecki | usagoldmines.com

The Google Pixel Tablet Is $140 Off Right Now Pradershika Sharma | usagoldmines.com

Apple Study: App Store Ecosystem Generated $1.3 Trillion Globally in 2024 Juli Clover | usagoldmines...

Take Control of Favicons in Safari's Favorites Bar Tim Hardwick | usagoldmines.com

Ballerina star Norman Reedus didn't seek advice from Keanu Reeves about joining the John Wick univer...

Update Chrome now! Your PC is at risk from this zero-day exploit | usagoldmines.com

OnePlus Pad 3 Official in US for $699 With Specs Worth Tasting Kellen | usagoldmines.com

'Saucy' Is the Perfect Cookbook to Elevate an Underwhelming Meal Allie Chanthorn Reinmann | usagoldm...

ChatGPT Now Integrates with Dropbox, Google Drive for Business Tim Hardwick | usagoldmines.com

These new robot lawn mowers use self-driving car tech to navigate | usagoldmines.com

The end of Intel Macs? The latest macOS 16 rumors have me worried about my 2018 MacBook Pro mark.wil...

Sennheiser's new USB Hi-Res Audio dongle can upgrade your Mac, iPhone or PC with aptX Lossless and B...

The world’s best travel camera is rumored to be getting an upgrade soon, with a potentially pricey n...

Intel’s Nova Lake processors rumored to have unique hybrid architecture – are we moving away from di...

Anthropic’s new AI-written blog is more of a technical treat than a literary triumph erichs211@gmail...

Nothing confirms that its first over-ear headphones will be unveiled next month, alongside the Nothi...

AirPods said to get some nice free upgrades at WWDC 2025, including more gesture control and sleep d...

ChatGPT can now listen in to your work calls, connect to your company Google Drive and much more | ...

Microsoft’s Surface Pro pricing is a ripoff | usagoldmines.com

Hard drive, SSD, or USB flash drive: Which portable storage is right for you? | usagoldmines.com

WhatsApp Testing AI Chatbot Creation Feature and Usernames Tim Hardwick | usagoldmines.com

Nioh 3 has been announced for 2026, but PS5 owners can play an exclusive demo right now | usagoldmi...

Will your iPhone get iOS 26? This is the rumored support list for the rebranded iOS 19 | usagoldmin...

Google's new Gemini Catch me up tool will tell you if anyone has been editing your precious work fil...

Wish your Windows 11 laptop had better battery life? Microsoft is working on a new power-saving tric...

Wicked: For Good trailer teases Dorothy's arrival in the Land of Oz, and it's making me want to stre...

FDA rushed out agency-wide AI tool—it’s not going well Beth Mole | usagoldmines.com

iPhone 17 May Support Up to 50W MagSafe Wireless Charging (Qi 2.2) Tim Hardwick | usagoldmines.com

The first trailer for 007 First Light reveals a young James Bond and it's coming to PC and console i...

The Google Pixel 10 series colors have leaked in full – and two old favorites are missing | usagold...

Microsoft launches free cybersecurity protection for European governments against AI threats and mor...

How AI can help experts protect their mental health | usagoldmines.com

The Samsung Galaxy Z Fold 7 could have a huge screen with tiny bezels | usagoldmines.com

Exclusive 28 Years Later character video teases bone-chilling new details about Ralph Fiennes' Docto...

Fake IT support voice calls lead to cyber extortion and stolen company data | usagoldmines.com

I haven’t seen ads in years thanks to this hack | usagoldmines.com

The best small wireless stereo speakers just got upgraded with better sound in the same great-lookin...

Beyond AI-powered cybersecurity: why context and visibility are still a CISO’s top priority | usago...

WWDC 2025: New Features We Could See in watchOS 26 Juli Clover | usagoldmines.com

Malware affiliate pyramid scheme is shuttered by US feds: here's how to keep safe | usagoldmines.co...

The Nintendo Switch 2 launch mania makes me miss the early iPhone launch days lance.ulanoff@futurene...

One of world's largest oil companies just launched a unique cooling fluid for data centers and AI ch...

Best PC computer deals: Top picks from desktops to all-in-ones | usagoldmines.com

Android 16 QPR1 Beta 1.1 Released for Pixel Devices Tim | usagoldmines.com

How Old Is Too Old When Buying an Apple Watch? Lindsey Ellefson | usagoldmines.com

Court Rejects Apple's Emergency Motion to Pause App Store Rule Changes Juli Clover | usagoldmines.co...

US science is being wrecked, and its leadership is fighting the last war John Timmer | usagoldmines....

New filament lets you 3D-print parts in authentic 1980s Apple computer color Benj Edwards | usagoldm...

Samsung Slaps $1,000 Off Galaxy Z Fold 6 Kellen | usagoldmines.com

How to Reset Your Nintendo Switch Before You Sell It Eric Ravenscraft | usagoldmines.com

Meta Apps Have Been Covertly Tracking Android Users' Web Activity for Months Jake Peterson | usagold...

Google plans to get its AI to write your emails for you erichs211@gmail.com (Eric Hal Schwartz) | us...

FCC Republican resigns, leaving agency with just two commissioners Jon Brodkin | usagoldmines.com

Jared Isaacman speaks out, and it’s clear that NASA lost a visionary leader Eric Berger | usagoldmin...

Pixel 10 Color Confusion Arrives Because, Why Not? Kellen | usagoldmines.com

Colors and Storage Options for Samung’s Upcoming Foldable Lineup Revealed Tim | usagoldmines.com

You Can Now Curate Your Public Reddit Profile Emily Long | usagoldmines.com

The Nothing Phone 3 Has a Launch Date, but I'm Not Sure the Price Is Right Jake Peterson | usagoldmi...

GhatGPT Can Now Remember Conversations for Free Users Too Khamosh Pathak | usagoldmines.com

iOS 26 Could Bring Sleep Detection, Camera Controls, and New Gestures to AirPods Juli Clover | usago...

Ready, set, gone: why popups, freezing, and tiny text are causing millions of app users to jump ship...

Remember The Simpsons Funday Football tie-in? Sony’s new NHL deal could see more animated heroes on ...

A new 'Wikipedia for extensions' wants to make your web browser far more secure by exposing dangerou...

American Science & Surplus is fighting for its life. Here’s why you should care. Eric Bangeman |...

OpenAI slams court order to save all ChatGPT logs, including deleted chats Ashley Belanger | usagold...

Samsung's ‘Goldilocks’ Galaxy phone may have set the standard for Apple’s iPhone 17 Air to chase | ...

Meta basically just bought a nuclear power plant | usagoldmines.com

If you haven't considered this super high-end bed with inbuilt KEF speakers, do you even love music?...

Lawsuit: DOGE, HHS used “hopelessly error-ridden” data to fire 10,000 workers Jon Brodkin | usagoldm...

It’s here: Unboxing and setting up our Switch 2 review unit Kyle Orland | usagoldmines.com

Alienware gets bricked (in a good way) with custom Lego set | usagoldmines.com

How to Watch Pornhub Even If It's Blocked In Your State David Nield | usagoldmines.com

Android Users Will Finally Be Able to Sync Their Garmin Fitness Data Meredith Dietz | usagoldmines.c...

Watch Out for Fake Websites Posing As Booking.com Emily Long | usagoldmines.com

How to Protect Your Car From Identity Theft Jeff Somers | usagoldmines.com

Cybercriminals are using SEO to get popular fake AI tools loaded with malware to rank high on Google...

Disney+ confirms release date for the Rachel Zegler led Snow White movie after its disappointing box...

Review: At $349, AMD’s 16GB Radeon RX 9060 XT is the new midrange GPU to beat Andrew Cunningham | us...

Are Dead Sea Scrolls older than we thought? Jennifer Ouellette | usagoldmines.com