Why do we call them trust boundaries?

 Adam Shostack's post delves into the terms "trust boundaries" and "security boundaries" in cybersecurity, exploring their history, distinctions, and applications. While "security boundaries" denote well-defined, robustly defended areas by security policy, "trust boundaries" imply broader trust-related elements, including privacy and computing bases. Shostack critiques the inconsistent commitments by companies to defending boundaries and explores if trust, as a concept, merits specific distinction within threat modeling practices. 

https://shostack.org/blog/trust-and-security-boundaries/

Comments

Popular posts from this blog

Endor Labs Announces Integrated SAST Offerings

The Hidden Cost of DevSecOps: Time and Financial Burden of Security on Developers

OWASP Releases Enhanced Dependency-Check Tool with Advanced Tagging and Policy Management Features