Security Watch Revisiting the 10 Immutable Laws of Security

Security Watch Revisiting the 10 Immutable Laws of Security, Part 2

Jesper M. Johansson

Contents

Law #4: If you allow a bad guy to upload programs to your Web site, it?s not your Web site anymore.

Law #5: Weak passwords trump strong security.

Law #6: A computer is only as secure as the administrator is trustworthy.

Law #7: Encrypted data is only as secure as the decryption key.

Conclusion

In last month's issue of TechNet Magazine, I kicked off a three-part series revisiting the well-known essay "10 Immutable Laws of Security." My objective is to evaluate them, eight years after they were first postulated, and see whether or not they still hold?in other words, to see if they really are "immutable." (You can find the first part of this series at http://technet.microsoft.com/en-ca/library/cc722487.aspx

I found that the first three laws hold up pretty well. Now I'm ready to scrutinize four more of the laws. In next month's final installment, I will discuss the final three laws, as well as offer some new insight that benefits from eight years of hindsight.

http://technet.microsoft.com/en-us/magazine/cc983778.aspx