Breaking
June 3, 2025

Secure by design: the MOD’s honest take | usagoldmines.com

The Ministry of Defence (MOD) recently published a document on ‘Secure by Design’ challenges that represents something we rarely see in government cybersecurity: a transparent acknowledgment of the complexities involved in implementing security from first principles.

Secure by design is a fundamental approach that embeds security into systems from the very beginning of the design process as opposed to treating it as a bolt-on feature later in development.

Having spent years advocating for the human element in security, it’s refreshing to see an official recognition that technical controls are only as effective as the people implementing them.

Addressing the Security Skills Challenge

The MOD’s first identified problem is “How do we up-skill UK defense in ‘Secure by Design’?”

Their acknowledgment that effective implementation requires a “one team” approach across UK defense reflects the reality that security cannot be siloed within technical teams.

This aligns perfectly with what I’ve observed in organizations with mature security cultures—security becomes everyone’s responsibility, not just the security department’s concern.

The Knowledge Distribution Problem

Perhaps most intriguing is problem two: “How does ‘Secure by Design’ account for unevenly distributed information and knowledge?”

The MOD correctly identifies that information asymmetry exists for various legitimate reasons. What makes this assessment valuable is the recognition that not all information-sharing barriers stem from poor security culture; some exist by design and necessity.

Imagine a family planning a surprise birthday party for their grandmother. Different family members have different pieces of information that they intentionally don’t share with everyone:

The daughter knows the guest list and has sent invitations directly to each person, asking them not to discuss it openly on family group chats,

The son has arranged the venue and catering, with specific dietary requirements for certain guests,

The grandchildren are handling decorations and have a theme they’re working on,

And most importantly—nobody tells grandmother anything about any of this.

This isn’t because the family has poor communication skills or doesn’t trust each other. These information barriers exist by design and necessity to achieve the goal of surprising grandmother. If everyone shared everything with everyone else, the surprise would be ruined.

The MOD’s approach

In the MOD’s security context, this is similar to how:

Certain threat intelligence can’t be shared with all suppliers because doing so might reveal intelligence-gathering capabilities,

Suppliers can’t share all their proprietary technology details even with clients like the MOD, as they need to protect their competitive advantage,

Specific security controls might be kept confidential from general staff to prevent those controls from being circumvented.

These aren’t failures of security culture—they’re intentional compartmentalization that sometimes make security work possible in the first place. The challenge isn’t eliminating these barriers but designing systems that can function effectively despite them.

This reflects the nuanced reality of human behavior in security contexts. People don’t withhold security information solely due to territoriality or negligence; often, legitimate constraints prevent the ideal level of transparency. The challenge becomes developing systems and practices that can function effectively despite these inherent limitations.

The Early Design Challenge

The third problem addresses a familiar paradox: how to implement security at the earliest stages of capability acquisition when the capability itself is barely defined.

In other words, it’s like trying to build a high-tech security system for a house when you only have a rough sketch of what the house might eventually look like – you know you need protection, but it’s difficult to plan specific security measures when you’re still deciding how many doors and windows there will be, what valuables will be stored inside, or even where the house will be located. As the MOD puts it, at this stage a capability might be “little more than a single statement of user need.”

This connects directly to how humans approach risk management. When primary objectives (delivering military capability) compete with secondary concerns (security), practical compromises inevitably emerge. The MOD’s candid acknowledgment that “cyber security will always be a secondary goal” reflects a pragmatic understanding of how priorities function in complex organizations.

Through-Life Security

Problem four addresses perhaps the most demanding human aspect of security: maintaining security rationale and practice across decades of a capability’s lifespan. With defense platforms potentially remaining operational for 30+ years, today’s security decisions must make sense to tomorrow’s engineers.

The question of continuous risk management becomes particularly relevant as organizations encounter new threats over their extended lifespans. How human operators interpret and respond to evolving risk landscapes determines the long-term security posture of these systems.

Building a Collaborative Security Culture

The MOD recognizes that ‘Secure by Design’ implementation isn’t merely a technical challenge but fundamentally about collaboration among people across organizational, disciplinary, and national boundaries.

The MOD’s approach suggests a shift toward a more mature security culture — one that acknowledges limitations, seeks external expertise, and recognizes the complex interplay between human factors and technical controls. Their openness about needing help from academia and industry demonstrates a collaborative mindset essential for addressing complex security challenges.

This collaborative approach to security culture stands in stark contrast to the traditional government tendency toward self-sufficiency. By explicitly inviting external perspectives, the MOD demonstrates an understanding that diverse viewpoints strengthen security posture rather than compromising it.

Security isn’t about having all the answers—it’s about creating the conditions where people can collaboratively develop appropriate responses to ever-changing threats.

We’ve compiled a list of the best identity management software.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

​ 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

The best gaming monitors: 9 displays that will do your games justice | usagoldmines.com

Lockly Secure Pro 2025 Version review: Once more, with Wi-Fi | usagoldmines.com

Google Maps to Look More Customized to Cars with Google Built-in, Starting With Polestar Kellen | us...

Telegram Finally Adds HD Photo Sharing Toggle Kellen | usagoldmines.com

Update Google Chrome ASAP to Fix a Critical Vulnerability Emily Long | usagoldmines.com

Apple Announces 2025 Design Award Winners Ahead of WWDC 2025 Juli Clover | usagoldmines.com

Chat Control – Poland's EU Presidency gives up on the voluntary scan of your encrypted chats chiara....

Five things we learned from The Witcher 4's technical demo | usagoldmines.com

AMD looks like it’s losing the GPU war based on new Steam survey, with Nvidia’s RTX 5060 Ti proving ...

Adobe finally releases Photoshop for Android, and it’s free (for now) Ryan Whitwam | usagoldmines.co...

I hate bright LED indicators, so I cover them with $5 dimming stickers | usagoldmines.com

US delays extra 25% tariffs on GPUs, motherboards to September | usagoldmines.com

Photoshop Beta Arrives on Android, Free to Use for Limited Time Tim | usagoldmines.com

Google Wallet Loses PayPal Kellen | usagoldmines.com

Search for Exact Words in Google Photos Using Quotes Tim | usagoldmines.com

What People are Getting Wrong this Week: Identifying AI Videos Stephen Johnson | usagoldmines.com

5 Underrated Apple Watch Features I Love Khamosh Pathak | usagoldmines.com

How to Split a Bill and Tip on Apple Watch Tim Hardwick | usagoldmines.com

Apple Provides Update on Store Closure in the Netherlands Joe Rossignol | usagoldmines.com

Prime Video's Carrie TV remake cast has been revealed, and it marks the latest lap of the Matthew Li...

I tested ChatGPT Advanced Voice Mode's sous-chef ability by baking banana bread – here’s how it went...

Meta Quest 4 reportedly delayed until 2027 – and we could see a whole new kind of Meta VR headset ha...

FBI, Secret Service operation takes down AVCheck site used to test malware | usagoldmines.com

From security to performance – NordVPN scores all positive results on new independent audit chiara.c...

Some parts of Trump’s proposed budget for NASA are literally draconian Stephen Clark | usagoldmines....

Best VPN services: 8 top picks for every VPN need | usagoldmines.com

Dozens of Zotac RTX graphic cards replaced with junk in sealed boxes | usagoldmines.com

Nvidia and Alienware may launch an Arm-based gaming laptop this year | usagoldmines.com

Classic Outlook app experiencing several issues after latest update | usagoldmines.com

Windows 11 lost users again in May, but not among gamers | usagoldmines.com

New Android malware adds fake contacts to make scam calls look legit | usagoldmines.com

Nothing Phone 3 Launches July 1 Kellen | usagoldmines.com

This Free App Will Stop Your Bluetooth Headphones From Connecting to Your Sleeping Mac Justin Pot | ...

How to Watch WWDC 2025 Jake Peterson | usagoldmines.com

Will Apple Announce Any New Hardware at WWDC 2025 Next Week? Joe Rossignol | usagoldmines.com

iPhone 16e Sales Lag Behind SE Models Despite Bestseller Status Hartley Charlton | usagoldmines.com

The AI search boom: why advertisers must embrace the next evolution of search | usagoldmines.com

The Witcher 4 gets new tech demo showcasing our first look at open-world gameplay and it gave me goo...

Genki launches a new gaming accessory collection designed for the Nintendo Switch 2 and 'to eliminat...

Qualcomm finally patches Adreno GPU zero-day flaws used in Android attacks | usagoldmines.com

“Godfather” of AI calls out latest models for lying to users Cristina Criddle, Financial Times | usa...

11 things you probably didn’t know the Switch 2 can do Kyle Orland | usagoldmines.com

Got patchy home Wi-Fi? This $13 extender could be your easiest fix | usagoldmines.com

These Wired, Open-Back Sennheiser Headphones Are Nearly Half Off Right Now Pradershika Sharma | usag...

These Nine Household Items Make Great Garden Tools Amanda Blum | usagoldmines.com

Amazon Takes Up to $100 Off Huge Collection of Apple Watch SE/Series 10 Models Mitchel Broussard | u...

"Just do it": Sam Altman says businesses looking to adopt AI should go ahead – or risk being left be...

The first Bluetooth 6.0 headphones are here, they're super-cheap, and they weigh less than 100g | u...

NYT Connections hints and answers for Wednesday, June 4 (game #724) | usagoldmines.com

NYT Strands hints and answers for Wednesday, June 4 (game #458) | usagoldmines.com

Quordle hints and answers for Wednesday, June 4 (game #1227) | usagoldmines.com

The new SteelSeries Arctis Nova 3 wireless gaming headset is here, sporting an impressive feature se...

PlayStation announces the latest State of Play presentation, and it's happening tomorrow | usagoldm...

Why the next evolution of hybrid work will be supported by AI | usagoldmines.com

Meta and Yandex are de-anonymizing Android users’ web browsing identifiers Dan Goodin | usagoldmines...

Milky Way galaxy might not collide with Andromeda after all Jennifer Ouellette | usagoldmines.com

“Free Roam” mode is Mario Kart World’s killer app Kyle Orland | usagoldmines.com

Crucial’s newest fast-and-tiny 1TB portable SSD is on sale for the first time | usagoldmines.com

Wyze’s new security cam screws into a standard light socket | usagoldmines.com

Why using a VPN and Tor together can backfire on your privacy | usagoldmines.com

Today’s best laptop deals: Save big on work, school, home use, and gaming | usagoldmines.com

Expand your laptop ports with Anker’s 4-device USB hub, now just $10 | usagoldmines.com

I Used AI-Powered Calorie Counting Apps, and They Were Even Worse Than I Expected Meredith Dietz | u...

I’m a Professional Cake Decorator and I Never Bake Without Cake Strips Allie Chanthorn Reinmann | us...

Apple TV+ Reportedly Outbidding NBC for More MLB Games Tim Hardwick | usagoldmines.com

How does antivirus software work? | usagoldmines.com

Nintendo is sending 'Out of Stock' signs to retailers ahead of the Switch 2 release | usagoldmines....

iOS 26 doesn’t need a massive AI upgrade at WWDC 2025 – here’s why I’m not losing hope with Apple In...

Ballerina: From the World of John Wick was delayed a whole year for a highly unusual but 'awesome' r...

De'Longhi just released a new version of its best compact espresso machine, and it's frankly adorabl...

Photoshop finally gets a pro-grade Android app – here are 3 reasons why I'm excited to try the free ...

You can now generate OpenAI Sora videos for free on iOS and Android – but only if you’re prepared to...

The North Face says customer data stolen in cyberattack | usagoldmines.com

WhatsApp Drops Support for These iPhone Models Tim Hardwick | usagoldmines.com

Reminder: Netflix stops working today on some older Amazon Fire TV devices – here's the list of mode...

It seems that Death Stranding 2: On the Beach will let players wield the awesome battle guitar featu...

Garmin Index Sleep Monitor: everything we know about Garmin's screenless Whoop-style recovery-orient...

Meta and Yandex are de-anonymizing Android users’ web browsing identifiers Dan Goodin | usagoldmines...

Tuesday Telescope: A time-lapse from orbit reveals treasures below Eric Berger | usagoldmines.com

Dell Plus 14 2-in-1 review: A versatile, inexpensive touchscreen machine | usagoldmines.com

Not just passwords: 8 other details to save in your password manager | usagoldmines.com

YouTube's iOS App Just Dropped Support for These iPhone Models Tim Hardwick | usagoldmines.com

Windows 11 is getting some big upgrades to tackle dreaded boot failures – and help novices set up th...

Cartier reveals data breach, personal customer information at risk | usagoldmines.com

Nothing Phone 3 prices and colors leaked, and it’s exactly as expensive as we expected | usagoldmin...

iPhone 17 and iPhone 17 Air ProMotion Rumors Disputed by Leaker Tim Hardwick | usagoldmines.com

A Google Pixel 10 prototype and possible release date have leaked, and it could be coming later than...

Pokémon Scarlet and Violet's 60fps upgrade on Nintendo Switch 2 genuinely makes it look a hundred ti...

Hitman developer IO Interactive will show off its new James Bond game, 007 First Light, at a special...

Microsoft and other security experts want a proper naming system for the worst hackers around benedi...

The Samsung Galaxy Z Fold 7 may miss out on the Android version of MagSafe – just like the Galaxy S2...

Security bug at compliance firm Vanta exposed customer data to other users | usagoldmines.com

Generative AI will become essential in enterprise security | usagoldmines.com

Using AI tools such as Microsoft Copilot could save UK civil servants weeks every year | usagoldmin...

Elden Ring Nightreign has sold more than 3.5 million copies as devs confirm DLC and two player mode ...

Handle your business’s accounting like a pro—Intuit QuickBooks is now over 60% off | usagoldmines.c...

What Agentic AI really means for enterprise | usagoldmines.com

'It's really misleading': Ballerina director Len Wiseman explains why the John Wick series' new movi...

Infosec Europe 2025: we're live at the show, and here's everything we've seen | usagoldmines.com

‘A grimy, gothic treat’: Netflix has a new crime procedural show with 81% on Rotten Tomatoes lucy.bu...