Skip to Content
Security from First Principles
book

Security from First Principles

by Craig Jackson, Scott Russell, Susan Sons
October 2017
Beginner
60 pages
1h 9m
English
O'Reilly Media, Inc.
Content preview from Security from First Principles

Chapter 4. Minimization

In order for three people to keep a secret, two must be dead.

Benjamin Franklin

The Principle: Minimize the size, quantity, and complexity of what is to be protected, and limit externally facing points of attack.

Key Question: Can this be a smaller target?

Related Concepts: Attack Surface, Compactness, Data Minimization, Simplicity

Minimization is the Principle of reducing needless size, complexity, and overly burdensome assets. Rather than burn resources attempting to secure ever-expanding data sets, systems, and networks, Minimization makes the practitioner’s job easier by reducing the number of things to care about, and by extension, the number of things that can go wrong.

Minimization is the principle of keeping things as small and simple as possible. Rather than erecting more walls, putting in place more checks, and hiring more guards, Minimization improves security by reducing the number of things that can go wrong, the number of points open to attack, the duration of high-risk exposure, the value of the assets you have to protect,1 and the consequences of failures. Every piece of information you store and every bit of complexity you add comes with a cost, and those costs must be weighed against the benefit that the addition provides. Even though it’s often tempting to add more security when faced with a problem, the drawbacks of that added security can prove more damaging than doing nothing at all, and the better option still would be to further ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Secure Coding: Principles and Practices

Secure Coding: Principles and Practices

Mark G. Graff, Kenneth R. van Wyk
Zero Trust Security: An Enterprise Guide

Zero Trust Security: An Enterprise Guide

Jason Garbis, Jerry W. Chapman

Publisher Resources

ISBN: 9781491996911