Abstract:
The author believes, that ensuring the information security of systems should begin at the design stage, rather than after implementation is over and verification starts. Also the author supports the point of view, that it is impossible to guarantee absolute information security, eliminate all defects and vulnerabilities from code once and forever. It is more realistic to assume that there are software defects are present in the inner permimeter of any system and the main question is how critical this issue will be for the systems customer assets. Developers shall focus their efforts in design and implementation in such a way that probability of successful attacks compromising system security objectives through critical code is minimal. Also such critical parts are defined and optimised for size and complexity during design phase, separated from non-critical parts, substantial efforts are invested in high qualirty implementation and thorough testing of such critical parts. The article describes how built-in protection against vulnerabilities and attacks can be illustrated using microservices-based architecture.
Keywords:cyber immunity, systems engineering, systems design, microservices, secure software development.
UDC:
004.41:004.056
Received:June 25, 2023 Accepted: December 26, 2023